找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information and Communications Security; 12th International C Miguel Soriano,Sihan Qing,Javier López Conference proceedings 2010 Springer B

[复制链接]
楼主: Thoracic
发表于 2025-3-28 15:01:50 | 显示全部楼层
发表于 2025-3-28 19:34:26 | 显示全部楼层
CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization The contributions of this paper are twofold: first, to investigate the characteristics and security requirements of CUDA-enabled cloud computing nodes; and, second, to provide an architecture for leveraging CUDA hardware resources in a secure virtualization environment, to improve cloud security wi
发表于 2025-3-29 01:05:27 | 显示全部楼层
SEIP: Simple and Efficient Integrity Protection for Open Mobile Platformsns while still achieves a high assurance of platform integrity. SEIP is deployed within a commercially available Linux-based smartphone and demonstrates that it can effectively prevent certain malware. The security policy of our implementation is less than 20kB, and a performance study shows that it
发表于 2025-3-29 06:36:00 | 显示全部楼层
Compromise-Resilient Anti-jamming for Wireless Sensor Networkse network will generate a new group key to be shared only by all non-compromised nodes. After that, the insider jammer is revoked and will be unable to predict the future communication channels used by non-compromised nodes. We implement and evaluate our solution using the Mica2 Mote platform and sh
发表于 2025-3-29 09:37:17 | 显示全部楼层
Cryptographic Hash Functions: Theory and Practiceis invested in this topic was rather limited. From the hundred designs published before 2005, about 80% was cryptanalyzed; this includes widely used hash functions such as MD4 and MD5. Moreover, serious shortcomings have been identified in the theoretical foundations of existing designs. In response
发表于 2025-3-29 12:22:13 | 显示全部楼层
发表于 2025-3-29 19:34:51 | 显示全部楼层
Fine-Grained Disclosure of Access Policies evaluation of (certified or uncertified) properties, that clients can present. Since assuming the client to know a-priori the properties she should present to acquire access is clearly limiting, servers should be able to respond to client requests with information on the access control policies reg
发表于 2025-3-29 19:49:58 | 显示全部楼层
发表于 2025-3-30 01:17:21 | 显示全部楼层
发表于 2025-3-30 07:25:57 | 显示全部楼层
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts schemes suffer from either long ciphertexts with size linear in the number of authorized users or can only achieve non-adaptive security. A non-adaptive attacker is assumed to disclose her target attacking set of users even before the system parameters are published. The notion of non-adaptive secu
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-7 01:09
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表