找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cryptology and Network Security; 19th International C Stephan Krenn,Haya Shulman,Serge Vaudenay Conference proceedings 2020 Springer Nature

[复制链接]
楼主: CROSS
发表于 2025-3-26 21:12:34 | 显示全部楼层
发表于 2025-3-27 04:02:22 | 显示全部楼层
Cross-Site Search Attacks: Unauthorized Queries over Private Datatract the information, using cleverly-designed cross-site queries..In this work, we present a systematic approach to the study of cross-site search attacks. We begin with a comprehensive taxonomy, clarifying the relationships between different types of cross-site search attacks, as well as relations
发表于 2025-3-27 05:46:12 | 显示全部楼层
Stronger Targeted Poisoning Attacks Against Malware Detectionhey inject a small amount of poisoning points into a training set of the machine learning model, aiming to degrade the overall accuracy of the model. . is a variant of data poisoning attacks that injects malicious data into the model to cause a misclassification of the . input data while keeping alm
发表于 2025-3-27 11:19:09 | 显示全部楼层
STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android Enviironments. Hence, a defense mechanism needs to be incorporated in emulation based analysis platforms to mitigate the emulation-detection strategies opted by malware. In this paper, first we design an emulation-detection library that has configurable capabilities ranging from basic to advanced detect
发表于 2025-3-27 15:12:07 | 显示全部楼层
发表于 2025-3-27 17:55:51 | 显示全部楼层
发表于 2025-3-27 23:09:55 | 显示全部楼层
发表于 2025-3-28 03:43:45 | 显示全部楼层
Trenchcoat: Human-Computable Hashing Algorithms for Password Generationdom” passwords, so they reuse or create similar passwords using a combination of predictable words, numbers, and symbols [.]. Previous password-generation or management protocols have imposed so large a cognitive load that users have abandoned them in favor of insecure yet simpler methods (., writin
发表于 2025-3-28 09:06:50 | 显示全部楼层
Provably Secure Scalable Distributed Authentication for Cloudsabase. In case of server compromise the secrets are vulnerable to theft. A possible solution to this problem to apply distributed systems. We propose a mutual authentication protocol with key agreement, where identity verification is carried out by multiple servers applying secret sharing technology
发表于 2025-3-28 11:00:30 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-26 13:21
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表