找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information and Communications Security; 8th International Co Peng Ning,Sihan Qing,Ninghui Li Conference proceedings 2006 Springer-Verlag B

[复制链接]
楼主: Clique
发表于 2025-3-25 10:48:57 | 显示全部楼层
A Security Analysis of the Precise Time Protocol (Short Paper)o (a) incorrectly resynchronize clocks, (b) rearrange or disrupt the hierarchy of PTP clocks, (c) bring the protocol participants into an inconsistent state, or (d) deprive victim slave clocks from synchronization in ways undetectable by generic network intrusion detection systems. We also propose c
发表于 2025-3-25 14:23:57 | 显示全部楼层
An Identity-Based Proxy Signature Scheme from Pairingslf of the original signer. In this paper we propose an ID-based proxy signature scheme from bilinear pairings. We provide exact security proof of the proposed ID-based proxy signature scheme in the random oracle model under the Computational Diffie-Hellman assumption without using Forking Lemma.
发表于 2025-3-25 19:47:19 | 显示全部楼层
发表于 2025-3-25 21:01:12 | 显示全部楼层
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper)any schemes proposed, but most of them have already been found flawed due to the lack of formal security analysis. On the cryptanalysis of this type of schemes, in this paper, we further review two recently proposed schemes and show that their security claims are invalid. To address the current issu
发表于 2025-3-26 01:44:35 | 显示全部楼层
Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Sizeproposed method to this scheme, the ciphertext size is reduced from . to .(.+log(./.)) without a substantial increase in the decryption-key size, where .,. denote the maximum number of colluders in a coalition and the total number of receivers respectively. The resulting scheme also supports black-b
发表于 2025-3-26 07:40:57 | 显示全部楼层
发表于 2025-3-26 11:24:23 | 显示全部楼层
A Construction for General and Efficient Oblivious Commitment Based Envelope Protocolsation about the attributes. Previous OCBE protocols are designed by taking zero-knowledge proof protocols that prove a committed value satisfies some property and changing the protocols so that instead of one party proving to the other party, the two parties compute two keys that agree if and only i
发表于 2025-3-26 15:39:22 | 显示全部楼层
发表于 2025-3-26 17:16:19 | 显示全部楼层
发表于 2025-3-27 00:54:39 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-21 22:37
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表