找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambie; 6th IFIP WG 11.2 Int Ioannis Askoxyla

[复制链接]
楼主: DEIGN
发表于 2025-3-26 21:30:12 | 显示全部楼层
Privacy Preservation of User History GraphIn this paper, we propose new ideas to protect user privacy while allowing the use of a user history graph. We define new privacy notions for user history graphs and consider algorithms to generate a privacy-preserving digraph from the original graph.
发表于 2025-3-27 03:17:41 | 显示全部楼层
发表于 2025-3-27 06:09:35 | 显示全部楼层
发表于 2025-3-27 10:02:02 | 显示全部楼层
发表于 2025-3-27 14:50:53 | 显示全部楼层
发表于 2025-3-27 18:39:42 | 显示全部楼层
How to Break EAP-MD5ow table pre-computed with a fixed challenge, which can be done efficiently with great probability through off-line computations. This kind of attack can also be implemented successfully even if the underlying hash function MD5 is replaced with SHA-1 or even SHA-512.
发表于 2025-3-28 00:28:49 | 显示全部楼层
An Efficient Lattice-Based Secret Sharing Constructionpproximation problems in lattices such as ..-approximate SVP. Different to protocols proposed by Pedersen this scheme uses efficient matrix vector operations instead of exponentiation to verify the secret shares.
发表于 2025-3-28 03:38:38 | 显示全部楼层
发表于 2025-3-28 06:41:27 | 显示全部楼层
发表于 2025-3-28 12:02:47 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-26 06:54
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表