找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security Practice and Experience; 15th International C Swee-Huay Heng,Javier Lopez Conference proceedings 2019 Springer Nature

[复制链接]
楼主: deferential
发表于 2025-3-26 21:31:05 | 显示全部楼层
978-3-030-34338-5Springer Nature Switzerland AG 2019
发表于 2025-3-27 04:31:01 | 显示全部楼层
Information Security Practice and Experience978-3-030-34339-2Series ISSN 0302-9743 Series E-ISSN 1611-3349
发表于 2025-3-27 06:17:55 | 显示全部楼层
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465314.jpg
发表于 2025-3-27 13:19:38 | 显示全部楼层
发表于 2025-3-27 14:51:02 | 显示全部楼层
Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme proposed strategy, the NTT was implemented following the lattice parameters in qTESLA, which is one of the round 2 candidates in NIST Post-Quantum Standardization competition. To the best of our knowledge, this is the first implementation of NTT in GPU with parameters from qTESLA. The proposed impl
发表于 2025-3-27 20:44:09 | 显示全部楼层
KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanismtual memory, we present the Kernel Memory Observer (KMO), which has a secret inspection mechanism and offers an alternative design for virtual memory. It allows the detection of illegal data manipulation/writing in the kernel virtual memory. KMO identifies the kernel virtual memory corruption, monit
发表于 2025-3-27 23:36:56 | 显示全部楼层
发表于 2025-3-28 02:51:24 | 显示全部楼层
JSLess: A Tale of a Fileless Javascript Memory-Resident Malware not limited to MS PowerShell. In this paper, we designed and implemented a fileless malware by taking advantage of new features in Javascript and HTML5. The proposed fileless malware could infect any device that supports Javascript and HTML5. It serves as a proof-of-concept (PoC) to demonstrate the
发表于 2025-3-28 07:03:12 | 显示全部楼层
Secure Best Arm Identification in Multi-armed BanditsIn other words, the two properties ensure that the protocol has no security single point of failure. We rely on the partially homomorphic property of the well-known Paillier’s cryptosystem as a building block in our protocol. We prove the correctness of our protocol and we present proof-of-concept e
发表于 2025-3-28 12:49:51 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-14 21:01
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表