找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security and Cryptology - ICISC 2001; 4th International Co Kwangjo Kim Conference proceedings 2002 Springer-Verlag Berlin Heide

[复制链接]
楼主: DEBUT
发表于 2025-3-30 10:41:48 | 显示全部楼层
发表于 2025-3-30 14:16:46 | 显示全部楼层
Decentralized Event Correlation for Intrusion Detection,ct such attacks therefore have to collect and correlate information from different sources. We propose a completely decentralized approach to solve the task of event correlation and information fusing of data gathered from multiple points within the network..Our system models an intrusion as a patte
发表于 2025-3-30 18:54:07 | 显示全部楼层
Enhancing the Security of Cookies, in a user’s shopping cart to authentication information used for accessing restricted pages. While cookies are clearly very useful, they can also be abused. In this paper, security threats that cookies can pose to a user are identified, as are the security requirements necessary to defeat them. Var
发表于 2025-3-31 00:46:44 | 显示全部楼层
A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation,ack systems and servers by hackers very frequently. Recently, many researches tried to prevent it, and several solutions were developed such as Libsafe and StackGuard; however, these solutions have a few problems. In this paper we present a new stack buffer overflow attack prevention technique that
发表于 2025-3-31 02:05:12 | 显示全部楼层
发表于 2025-3-31 06:46:48 | 显示全部楼层
Binary Codes for Collusion-Secure Fingerprinting,iderations, the pirates’ probablity of success (which must be non-zero, as was shown by Boneh and Shaw) on one hand, and decoding complexity on the other. We show how to minimize the pirates’ probability of success: but the associated decoding complexity is .(. .), where . is the number of users. Ne
发表于 2025-3-31 12:50:04 | 显示全部楼层
Copyright Protection of Object-Oriented Software,rmarks on three “orthogonal” levels. For the first level, watermarks are injected into objects. The second level watermarking is used to select proper variants of the source code. The third level uses transition function that can be used to generate copies with different functionalities. Generic wat
发表于 2025-3-31 16:14:46 | 显示全部楼层
发表于 2025-3-31 21:02:05 | 显示全部楼层
Slide Attacks with a Known-Plaintext Cryptanalysis,yzing on the other part, the key scheduling part, are known. A slide attack is an instance of attacks exploiting the key schedule weakness. In this paper, currently proposed slide attacks can be still enhanced so that all currently published known-plaintext analytic technique can be applied to small
发表于 2025-3-31 23:49:03 | 显示全部楼层
Constructions of Cheating Immune Secret Sharing,submit invalid shares to the combiner. In the second one, the cheaters collectively decide which shares are to be modified so the combiner gets a mixture of valid and invalid shares from the cheaters. The secret scheme is said to be .-cheating immune if any group of . cheaters has no advantage over
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-12 13:23
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表