找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Systems Security; 4th International Co R. Sekar,Arun K. Pujari Conference proceedings 2008 Springer-Verlag Berlin Heidelberg 20

[复制链接]
楼主: 诡计
发表于 2025-3-30 10:29:45 | 显示全部楼层
发表于 2025-3-30 13:13:27 | 显示全部楼层
A Robust Reputation Scheme for Decentralized Group Management Systemsmalicious entities. The associated models are based on mathematic formulae, in order to formaly define elements such as the reputation evaluation and evolution and the reputation propagation between peers. Current proposals describe the behaviors of their models by examples, with few (if not no) for
发表于 2025-3-30 19:41:41 | 显示全部楼层
发表于 2025-3-30 21:48:59 | 显示全部楼层
Secure Internet Voting Based on Paper Ballotsection process making it fast, reliable and inexpensive. Nonetheless, so far the problem of providing security of remote voting is considered to be very difficult, as one has to take into account susceptibility of the voter’s PC to various cyber-attacks. As a result, most of the research effort is p
发表于 2025-3-31 01:22:21 | 显示全部楼层
A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper)ty and non-repudiation of digital data over time. Most of the existing timestamping schemes use the notions of round (a period of time) and round token (a single value aggregating the timestamping requests received during one round). Such schemes have the following drawbacks: (i) Clients who have su
发表于 2025-3-31 07:15:14 | 显示全部楼层
A Framework for Trustworthy Service-Oriented Computing (Short Paper) a service provider’s business model and must execute in a high assurance environment. Increasingly, hardware mechanisms are required to create high-assurance closed environments to host trusted software on open platforms. In current approaches, independent hardware vendors (IHVs) design and impleme
发表于 2025-3-31 12:21:39 | 显示全部楼层
Revisiting Bluetooth Security (Short Paper)vices. As the communication medium is wireless, security is an important concern in this emerging technology. This paper discusses the basic security of Bluetooth technology, some of its shortcomings and presents two new proposals for securing Bluetooth technology. One of the proposals is based on p
发表于 2025-3-31 16:03:46 | 显示全部楼层
发表于 2025-3-31 20:30:04 | 显示全部楼层
Computing on Encrypted Datamental question give rise to a wide variety of applications. Here, we explore this question in a number of settings, focusing on how interaction and secure hardware can help us compute on encrypted data, and what can be done if we have neither interaction nor secure hardware at our disposal.
发表于 2025-3-31 23:40:13 | 显示全部楼层
Identification of Cryptographically Strong and Weak Pseudorandom Bit Generatorse security of information is at stack. In this paper we are giving a model which will use confidence interval and multidimentional scaling for their identification. This statistical model can be used to estimate the strength of a new PRBGs.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-19 23:52
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表