找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information and Communications Security; 20th International C David Naccache,Shouhuai Xu,Ahmed Meddahi Conference proceedings 2018 Springer

[复制链接]
楼主: 凝固
发表于 2025-3-27 00:03:45 | 显示全部楼层
发表于 2025-3-27 02:52:19 | 显示全部楼层
发表于 2025-3-27 07:36:13 | 显示全部楼层
发表于 2025-3-27 09:47:43 | 显示全部楼层
Study on Advanced Botnet Based on Publicly Available Resourcescurity, defenders take more attention on advanced botnet designs that could be used by botmasters. In this paper, we design an advanced botnet based on publicly available resources, and implement its prototype system, which is named as PR-Bot. First of all, in terms of system design, PR-Bot is compl
发表于 2025-3-27 13:37:34 | 显示全部楼层
Deep Packet Inspection with Delayed Signature Matching in Network Auditingature matching, and many researchers focus on improving the signature matching algorithms. In this paper, we work from a different angle: the scheduling of signature matching. We propose a method called Delayed Signature Matching (DSM), which could greatly reduce the number of matching attempts. In
发表于 2025-3-27 20:07:50 | 显示全部楼层
Low-Rate DoS Attack Detection Based on Two-Step Cluster Analysisvictim. Although many LDoS attack detection methods have been proposed, LDoS attacks are still difficult to accurately detect due to their low rate and good concealment. In this paper, we propose a novel method to detect LDoS attacks based on the fact that TCP traffic under LDoS attacks is more disc
发表于 2025-3-28 01:18:50 | 显示全部楼层
On the Weakness of Constant Blinding PRNG in Flash Playerlinding mechanism in Flash Player and analyse the weakness in its pseudo random number generator (PRNG). We demonstrate how such weakness can be exploited to recover the seed value in PRNG, thus bypass the constant blinding in Flash Player..We propose two methods to circumvent constant blinding in F
发表于 2025-3-28 03:26:16 | 显示全部楼层
发表于 2025-3-28 07:44:24 | 显示全部楼层
发表于 2025-3-28 10:57:13 | 显示全部楼层
Accelerating Integer Based Fully Homomorphic Encryption Using Frequency Domain Multiplication up the encryption process by optimizing the very large asymmetric multiplications required. A frequency domain approach is adopted for the multiplication using the Number Theoretic Transforms (NTTs) where the strict relationship between the NTT parameters is relaxed to allow for more optimized hard
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-25 23:32
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表