找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security Practice and Experience; 8th International Co Mark D. Ryan,Ben Smyth,Guilin Wang Conference proceedings 2012 Springer-

[复制链接]
楼主: Sentry
发表于 2025-3-30 11:41:36 | 显示全部楼层
T-out-of-n Distributed Oblivious Transfer Protocols in Non-adaptive and Adaptive Settingsin one out of two secrets held by a sender. In its generalized version presented by Blundo, D’Arco, De Santis, and Stinson, a receiver can choose one out of . secrets..In this paper, we introduce three unconditionally secure DOT protocols which allow a receiver to obtain . out of . secrets..The firs
发表于 2025-3-30 13:47:38 | 显示全部楼层
A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions as in the paradigm proposed in [20,6]. We also show that the protocol is computationally secure against passive and active adversaries. To our knowledge, this is the first practical code-based . protocol. The proposed protocol is compared with some existing number-theoretic . protocols for efficien
发表于 2025-3-30 20:30:00 | 显示全部楼层
Towards Fine-Grained Access Control on Browser Extensionsun time by means of restricting the access to resources, in order to prevent the malicious JSEs from ruining users security. The resource access of a JSE, which constrains its behavior, is the basis of the functionalities of it. Instead of the conventional static access control rules, we formulate t
发表于 2025-3-30 20:50:33 | 显示全部楼层
Enhanced STE3D-CAP: A Novel 3D CAPTCHA Familys a standard security countermeasure against Internet attacks such as distributed denial of service attacks and botnets. However, many CAPTCHA schemes themselves have been found to be susceptible to automated attacks. The task of designing a good CAPTCHA scheme is still an open and challenging quest
发表于 2025-3-31 02:13:09 | 显示全部楼层
High-Entropy Visual Identification for Touch Screen Devicesed, highly entropic data suitable for use as (part of) a strong secret key from a user’s act of identifying to the device. Our system uses visual cryptography [21], using no additional electronics and no memorization on the part of the user. Instead, we require the use of a transparency overlaid on
发表于 2025-3-31 06:50:09 | 显示全部楼层
A Framework for Security Analysis of Key Derivation Functionstographic keys from a private seed value where the derived cryptographic keys are indistinguishable from random binary strings. We form a framework of five security models for KDFs. This consists of four security models that we propose: Known Public Inputs Attack (KPM, KPS), Adaptive Chosen Context
发表于 2025-3-31 11:48:25 | 显示全部楼层
发表于 2025-3-31 14:15:00 | 显示全部楼层
发表于 2025-3-31 19:03:12 | 显示全部楼层
Lightweight Integrity for XOR Network Coding in Wireless Sensor Networksbefore spreading the pollution in the XOR network coding systems. In order to perform such filtering, two or more message authentication codes (MACs) are used for this scheme. However, Yu’s scheme has a problem that the number of MACs increases at every coding point, since it cannot operate MACs wit
发表于 2025-3-31 22:19:01 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-17 23:01
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表