找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information and Communications Security; 9th International Co Sihan Qing,Hideki Imai,Guilin Wang Conference proceedings 2007 Springer-Verla

[复制链接]
楼主: sprawl
发表于 2025-3-28 18:15:37 | 显示全部楼层
发表于 2025-3-28 21:00:09 | 显示全部楼层
On the Design of Fast Prefix-Preserving IP Address Anonymization Schemethm uses precomputed bit string to improve the anonymization performance. Instead of only using the LSB of each Rijndael output, the embedded bit string algorithm will take advantage of the full size Rijndael output to anonymize several bits at the same time. The implementation can be downloaded from https://sourceforge.net/projects/ipanon.
发表于 2025-3-28 22:54:11 | 显示全部楼层
MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Seture by .. The experimental results demonstrate that MDH can improve matching performance by 100% to 300% comparing with other popular algorithms, whereas the memory requirement stays in a comparatively low level.
发表于 2025-3-29 06:30:02 | 显示全部楼层
A New Dynamic Accumulator for Batch Updates dynamic accumulator for batch updates based on the Paillier cryptosystem. Our construction makes a batch of update operations at unit cost. We prove its security under the extended strong RSA (es-RSA) assumption.
发表于 2025-3-29 09:56:58 | 显示全部楼层
发表于 2025-3-29 15:00:31 | 显示全部楼层
PAKE,: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords.(log.). Additionally, the hierarchical feature of .PAKE. enables every subgroup obtains their own subgroup key in the end. We also prove the security of our protocol under the random oracle model and the ideal cipher model.
发表于 2025-3-29 15:45:26 | 显示全部楼层
Formal Definition and Construction of Nominative Signatureropose a formal definition and adversarial model for nominative signature. Third, we show that Chaum’s undeniable signature can be transformed to an efficient nominative signature by simply using a standard signature. The security of our transformation can be proven under the standard number-theoretic assumption.
发表于 2025-3-29 22:59:28 | 显示全部楼层
Preventing Unofficial Information Propagationnd the Platform for Privacy Preferences (P3P) assumes that qualified or certified credential viewers are honest and reliable. The proposed approach in this paper uses short-lived credentials based on reverse forward secure signatures to remove this assumption and mitigate the damage caused by a dishonest or honest but compromised viewer.
发表于 2025-3-30 00:26:42 | 显示全部楼层
发表于 2025-3-30 06:53:59 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-22 08:21
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表