找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security Technology for Applications; 15th Nordic Conferen Tuomas Aura,Kimmo Järvinen,Kaisa Nyberg Conference proceedings 2012

[复制链接]
楼主: 马用
发表于 2025-3-23 12:26:55 | 显示全部楼层
发表于 2025-3-23 17:51:58 | 显示全部楼层
Credential Disabling from Trusted Execution Environmentsrious applications and services. An important requirement for any credential platform is the ability to . and . credentials. In this paper, we raise the problem of temporary credential disabling from embedded TrEEs and explain why straightforward solutions fall short. We present two novel credential
发表于 2025-3-23 19:03:10 | 显示全部楼层
Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications and card users. Since these applications contain sensitive data and can exchange information, a major concern is the assurance that these applications will not exchange data unless permitted by their respective policies. We suggest an approach for load time application certification on the card, th
发表于 2025-3-23 22:49:42 | 显示全部楼层
发表于 2025-3-24 02:29:58 | 显示全部楼层
发表于 2025-3-24 07:51:16 | 显示全部楼层
Security of Web Mashups: A Surveypend on interaction between content from multiple origins and communication with different origins. Contradictory, mashup security relies on separation for protecting code and data. Traditional HTML techniques fail to address both the interaction/communication needs and the separation needs. This pa
发表于 2025-3-24 11:10:25 | 显示全部楼层
Safe Wrappers and Sane Policies for Self Protecting JavaScriptealing because it requires neither deep transformation of the code nor browser modification. Unfortunately the implementation outlined suffers from a range of vulnerabilities, and policy construction is restrictive and error prone. In this paper we address these issues to provide a systematic way to
发表于 2025-3-24 16:09:37 | 显示全部楼层
发表于 2025-3-24 21:13:51 | 显示全部楼层
Secure and Fast Implementations of Two Involution Ciphersime software implementations of Anubis and Khazad for processors with a byte-vector shuffle instruction, such as those that support SSSE3. For Anubis, the first is serial in the sense that it employs only one cipher instance and is compatible with all standard block cipher modes. Efficiency is large
发表于 2025-3-25 01:36:35 | 显示全部楼层
academics, and university administrators.Uses international.This open access book explores the impact of Covid-19 on universities, and how students, staff, faculty and academic leaders have adapted to and dealt with the impact of the pandemic. Drawing on experiences from Britain, Australia and Swed
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-5 00:15
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表