找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security; 17th International C Sherman S. M. Chow,Jan Camenisch,Siu Ming Yiu Conference proceedings 2014 Springer International

[复制链接]
楼主: EXTRA
发表于 2025-3-25 07:08:34 | 显示全部楼层
Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocolsn the semi-honest model. In this work, we propose a new class of zero-knowledge proofs, which are tailored for crypto-computing protocols. First, these proofs directly employ properties of the underlying crypto systems and thus many facts have more concise proofs compared to generic solutions. Secon
发表于 2025-3-25 09:34:25 | 显示全部楼层
发表于 2025-3-25 11:44:24 | 显示全部楼层
发表于 2025-3-25 19:40:23 | 显示全部楼层
发表于 2025-3-25 20:11:52 | 显示全部楼层
On Formally Bounding Information Leakage by Statistical Estimationded, and little is known about the input generation mechanism. After introducing a statistical set-up and defining a formal notion of information leakage ., we prove that, in the absence of significant a priori information about the output distribution, no such estimator can in fact exist that does
发表于 2025-3-26 01:05:36 | 显示全部楼层
Structure Based Data De-Anonymization of Social Networks and Mobility Tracesased De-Anonymization (DA) framework which iteratively de-anonymizes data with an accuracy guarantee. Then, to de-anonymize data . between the anonymized data and the auxiliary data, we generalize DA to an Adaptive De-Anonymization (ADA) framework. Finally, we examine DA/ADA on mobility traces and s
发表于 2025-3-26 07:54:27 | 显示全部楼层
Investigating the Hooking Behavior: A Page-Level Memory Monitoring Method for Live Forensicsy dump. That’s because such behavior is transient and the snapshot of memory usually doesn’t contain enough information about it. Lack of this information will cause an uncompleted chain of evidence. Although dynamic analysis can trace this behavior by instruction-level analysis, this technique is s
发表于 2025-3-26 08:53:50 | 显示全部楼层
发表于 2025-3-26 13:19:09 | 显示全部楼层
Soundsquatting: Uncovering the Use of Homophones in Domain Squattingatting, an attacker takes advantage of homophones, i.e., words that sound alike, and registers homophone-including variants of popular domain names. We explain why soundsquatting is different from existing domain-squatting attacks, and describe a tool for the automatic generation of soundsquatting d
发表于 2025-3-26 18:39:50 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-19 12:24
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表