找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security Practice and Experience; 5th International Co Feng Bao,Hui Li,Guilin Wang Conference proceedings 2009 Springer-Verlag

[复制链接]
楼主: 赞美
发表于 2025-3-25 04:12:07 | 显示全部楼层
RSA-Based Certificateless Public Key Encryptionty-Based Cryptography. In this paper, we present a new practical construction of certificateless public key encryption scheme without paring. Our scheme is, in the random oracle model, provably secure under the assumption that the RSA problem is intractable.
发表于 2025-3-25 10:05:30 | 显示全部楼层
On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairingsat a party is indeed the signer for a given signature. In general, the public key of a user needs a management authority to authenticate it. It results in that traditional public key cryptosystem (PKC) requires high maintenance cost for certificate management. Although, identity based cryptosystem (
发表于 2025-3-25 12:38:55 | 显示全部楼层
An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems these phone features. We have implemented a number of attacks and experimented with VoIP services by leading VoIP service providers Vonage, AT&T and Gizmo. Our experimental results demonstrate that a man-in-the-middle or remote attacker could transparently 1) hijack selected E911 calls and imperson
发表于 2025-3-25 18:50:33 | 显示全部楼层
Reconstructing a Packed DLL Binary for Static Analysisacked DLLs hinder static code analysis such as disassembly. In this paper, we propose a technique to reconstruct a binary file for static analysis by loading a DLL and triggering and monitoring the execution of the entry-point function and exported functions of packed DLLs. By monitoring all memory
发表于 2025-3-25 21:25:04 | 显示全部楼层
发表于 2025-3-26 03:10:38 | 显示全部楼层
发表于 2025-3-26 05:49:03 | 显示全部楼层
New Constructions for Reusable, Non-erasure and Universally Composable Commitmentsntation is secure in the universally composable paradigm assuming that the decisional Diffie-Hellman problem over a squared composite modulus of the form . =. is hard. Our methodology relies on state-of-the-art double trap-door public-key encryption protocols so that a simulator in charge of a commo
发表于 2025-3-26 10:53:27 | 显示全部楼层
发表于 2025-3-26 14:16:26 | 显示全部楼层
发表于 2025-3-26 18:47:24 | 显示全部楼层
A Novel Adaptive Watermarking Scheme Based on Human Visual System and Particle Swarm Optimizationdiscrete wavelet transform (DWT) and discrete cosine transform (DCT). The secret watermark bits are embedded on the singular values vector of blocks within low frequency subband in host image hybrid DWT-DCT domain. To embed watermark imperceptibly, robustly and securely, we model the adaptive quanti
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-18 04:14
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表