找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security Applications; 5th International Wo Chae Hoon Lim,Moti Yung Conference proceedings 2005 Springer-Verlag Berlin Heidelbe

[复制链接]
楼主: notable
发表于 2025-3-30 10:35:17 | 显示全部楼层
Encrypted Watermarks and Linux Laptop Securityloop device, known as CryptoLoop. We demonstrate clear weaknesses in the current CBC-based implementation of CryptoLoop, perhaps the most surprising being a very simple attack which allows specially watermarked files to be identified on an encrypted hard disk without knowledge of the secret encrypti
发表于 2025-3-30 12:29:12 | 显示全部楼层
Inconsistency Detection of Authorization Policies in Distributed Component Environmenthereas the components are distributed to an application server on a network with their authorization policies. It is necessary to detect inconsistency between the authorization policies of the RBAC server and the distributed components to guarantee the authorization policy integrity while system con
发表于 2025-3-30 20:20:03 | 显示全部楼层
发表于 2025-3-30 22:44:13 | 显示全部楼层
Public Key Encryption with Conjunctive Field Keyword Searchut the document. An email gateway, for example, may be desired to test whether the email contains a keyword “urgent” so that it could route the email accordingly, without leaking any content to the gateway. This mechanism was referred as . [4]. Similarly, a user may want to enable an email gateway t
发表于 2025-3-31 01:49:15 | 显示全部楼层
A Probabilistic Method for Detecting Anomalous Program Behaviore order and the kind of system calls. We focus on a non-sequential feature of system calls given from a program. We apply a Bayesian network to predicting the .-th system call from the sequence of system calls of the length .–1. In addition, we show that a correlation between several kinds of system
发表于 2025-3-31 08:21:25 | 显示全部楼层
发表于 2025-3-31 13:08:34 | 显示全部楼层
发表于 2025-3-31 15:23:41 | 显示全部楼层
发表于 2025-3-31 20:39:16 | 显示全部楼层
发表于 2025-3-31 21:47:42 | 显示全部楼层
Efficient Authenticated Key Agreement Protocol for Dynamic Groupsed key agreement protocol (EGAKA), which is designed to be fully distributed and fault-tolerant, provides efficient dynamic group membership management, mutual authentication among group members and is secure against both passive and active attacks. The features of EGAKA are as follows: Firstly, EGA
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-5 15:44
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表