用户名  找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security and Privacy; 9th Australasian Con Huaxiong Wang,Josef Pieprzyk,Vijay Varadharajan Conference proceedings 2004 Springer

[复制链接]
楼主: nourish
发表于 2025-3-26 23:26:36 | 显示全部楼层
Multi-service Oriented Broadcast Encryptiona threshold, a rekeying algorithm is proposed to update the user’s service memberships .. We formalize and prove the framework is dynamically secure under the random oracle model. We realize our framework with a scheme based on complete subtree method.
发表于 2025-3-27 03:36:21 | 显示全部楼层
NGSCB: A Trusted Open Systemol and network authentication in mass market systems by authenticating executable code at all system layers. We have implemented a prototype of the system and expect the full system to be mass deployed.
发表于 2025-3-27 07:27:34 | 显示全部楼层
Analysis of a Conference Scheme Under Active and Passive Attackss in the way that a colluding group of attackers can still obtain the conference key even after they all leave the conference. The passive attack does not need any attacker to ever participate in the conference. The conference key can be compromised with a large probability as long as the number of conferees is large.
发表于 2025-3-27 12:36:05 | 显示全部楼层
发表于 2025-3-27 16:20:39 | 显示全部楼层
Multi-service Oriented Broadcast Encryptionhis paper, we suggest a framework called . framework from the subset cover method [12] using RSA exponentiation technique. In this framework, each user’s secret storage is independent of the number of services. Service subscriptions and service providing can be efficiently processed. The service uns
发表于 2025-3-27 19:26:20 | 显示全部楼层
发表于 2025-3-28 00:32:10 | 显示全部楼层
Linear Code Implies Public-Key Traitor Tracing with ,urosawa–Desmedt scheme, can be derived from an [.,.,.]-linear code such that . ≥ 2.+1. In this paper, we show that the linear-coded Kurosawa–Desmedt scheme can be modified to allow revocation of users, that is to show a revocation scheme can be derived from a linear code. The overhead of the modifie
发表于 2025-3-28 04:39:39 | 显示全部楼层
发表于 2025-3-28 07:43:27 | 显示全部楼层
Single Database Private Information Retrieval with Logarithmic Communicationty and a solution with only logarithmic user-side communication complexity. Previously the best result could only achieve polylogarithmic communication on each side, and was based on certain less well-studied assumptions in number theory [6]. On the contrary, our schemes are based on Paillier’s cryp
发表于 2025-3-28 11:49:13 | 显示全部楼层
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructionson the size of the predistributed data, as well as the size of the communications in any (one-round) protocol. We then show that these bounds are tight by exhibiting a scheme for oblivious polynomial evaluation achieveing all the lower bounds simultaneously. We also present a natural generalisation
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-15 15:10
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表