找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security Applications; 9th International Wo Kyo-Il Chung,Kiwook Sohn,Moti Yung Conference proceedings 2009 Springer-Verlag Berl

[复制链接]
楼主: CAP
发表于 2025-4-1 05:06:11 | 显示全部楼层
Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Networkis that it requires constant storage of personal keys for each user. In this paper, we show that Dutta’s scheme is insecure against the proposed attack, whereby users can access any other’s secret keys and session keys which they should not know according to Dutta’s scheme. Moreover, we proposed two
发表于 2025-4-1 08:38:52 | 显示全部楼层
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocolt proposals (except for those based in hard problems such as the HB [1-3] family) in the area [4-6] and identifies the common weaknesses that have left all of them open to various attacks [7-11]. Finally, we present Gossamer, a new protocol inspired by the recently published SASI scheme [13], that w
发表于 2025-4-1 10:17:32 | 显示全部楼层
发表于 2025-4-1 14:37:15 | 显示全部楼层
Public Key Authentication with Memory Tokensas moderate memory requirements. Our technique is particularly attractive on platforms where memory is already available, since it can be implemented at practically no cost, without any CPU, and with an extremely simple memory access control mechanism.
发表于 2025-4-1 20:07:48 | 显示全部楼层
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signathas been extended to certificate-based signatures. To date, several new schemes and security models of certificate-based signatures have been proposed. In this paper, we first introduce a new security model of certificate-based signatures. Our model is not only more elaborated when compared with the
发表于 2025-4-2 01:47:11 | 显示全部楼层
Cryptanalysis of Mu et al.’s and Li et al.’s Schemes and a Provably Secure ID-Based Broadcast Signcrthat only a privileged subset of users can decrypt it. In addition, to avert junk content or spam, subscribers must have source authentication with respect to their broadcasters. The limited memory and computational power of mobile devices, coupled with escalating costs of wireless bandwidth make ef
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-11 08:25
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表