找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security; 14th International C Xuejia Lai,Jianying Zhou,Hui Li Conference proceedings 2011 Springer-Verlag GmbH Berlin Heidelbe

[复制链接]
楼主: 哄笑
发表于 2025-3-26 21:36:55 | 显示全部楼层
Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryptryption (IBE), respectively. It seems natural that there is a close relationship between TRE and PEKS. However, no explicit bridge has been shown between TRE and PEKS so far. In this paper, we show that TRE can be generically constructed by PEKS with extended functionalities, called secure-channel f
发表于 2025-3-27 02:45:28 | 显示全部楼层
The ,-Diffie-Hellman Problem and Its Applicationsnded to the .-Diffie-Hellman (.-DH) problem for an arbitrary integer ., and this new problem is shown to be at least as hard as the ordinary DH problem. Like the twin DH problem, the .-DH problem remains hard even in the presence of a decision oracle that recognizes solution to the problem. On the o
发表于 2025-3-27 06:48:20 | 显示全部楼层
发表于 2025-3-27 11:45:51 | 显示全部楼层
发表于 2025-3-27 17:17:30 | 显示全部楼层
发表于 2025-3-27 21:19:02 | 显示全部楼层
Detection and Analysis of Cryptographic Data Inside Softwareoutput data and intermediated states of operation) is important to security analysis. However, various implementations of cryptographic algorithms lead the automatic detection and analysis to be very hard. This paper proposes a novel automatic cryptographic data detection and analysis approach. This
发表于 2025-3-28 01:28:36 | 显示全部楼层
: Minimizing Information Disclosure to Third Parties in Single Sign-on Platformsail identity, or personalize their browsing experience through a set of plug-ins that interact with the users’ social profile. Research results suggest that more than two million Web sites have already adopted Facebook’s social plug-ins, and the number is increasing sharply. Although one might theor
发表于 2025-3-28 05:03:49 | 显示全部楼层
Hello rootKitty: A Lightweight Invariance-Enforcing Frameworkng on a host. A successful attack against an operating system’s kernel means a total and complete compromise of the running system. These attacks usually end with the installation of a rootkit, a stealthy piece of software running with kernel privileges. When a rootkit is present, no guarantees can
发表于 2025-3-28 08:38:22 | 显示全部楼层
On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraintsity by vertical fragmentation and without relying on encryption. Although prohibiting unauthorised (direct) accesses to confidential information, this approach has so far ignored the fact that attackers might infer sensitive information logically by deduction. In this article vertical fragmentation
发表于 2025-3-28 11:12:35 | 显示全部楼层
Round-Efficient Oblivious Database Manipulationr, data manipulation in such databases can be slow and cumbersome without dedicated protocols for certain database operations. In this paper, we provide efficient protocols for oblivious selection, filtering and shuffle—essential tools in privacy-preserving data analysis. As the first contribution,
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-5 00:04
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表