找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information and Communications Security; 4th International Co Robert Deng,Feng Bao,Sihan Qing Conference proceedings 2002 Springer-Verlag B

[复制链接]
楼主: gratuity
发表于 2025-3-30 10:46:44 | 显示全部楼层
Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attackng computer system. This paper presents a scheme of protecting program counter by encoding function pointers. In the scheme, every function address is encoded by linker. Compiler inserts instructions for decoding function addresses before call instruction. Encoding code pointers, function addresses
发表于 2025-3-30 14:10:39 | 显示全部楼层
An Evaluation of Different IP Traceback Approachesten use incorrect, or spoofed, source IP addresses. In this paper we present the results from a comparison between some of the most promising traceback techniques proposed to solve this problem. Our goal was to evaluate and analyze the most promising techniques on our way to find a more efficient ap
发表于 2025-3-30 16:38:32 | 显示全部楼层
Security against Inference Attacks on Negative Information in Object-Oriented Databaseses. Although many studies so far focus on only inference of positive information (i.e., which object is the execution result of a given unauthorized query), negative information (i.e., which object is never the execution result of a given unauthorized query) is also sensitive. In this paper, we defi
发表于 2025-3-31 00:23:57 | 显示全部楼层
Robust Key-Evolving Public Key Encryption Schemessed for forward-secure digital signature schemes. Let time be divided into time periods such that at time period ., the decryptor holds the secret key .., while the public key PK is fixed during its lifetime. At time period ., a sender encrypts a message . as 〈.〉, which can be decrypted only with th
发表于 2025-3-31 01:24:04 | 显示全部楼层
A Group Signature Scheme Committing the Groupn a message on behalf of a group, and the anonymity of the signature can be revoked by only a designated authority. Consider a situation that multiple groups exist. In the proposed scheme, the signature hides not only the identity of the signer, but also the identity of the group. The group can be s
发表于 2025-3-31 08:54:02 | 显示全部楼层
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructionsnto and secret information, e.g. decryption key, may be exposed. Very recently, a new framework for the protection against such key exposure problem was suggested and was called, . (KIE). In this paper, we study key insulated cryptosystems without computational assumptions. First, we define the mode
发表于 2025-3-31 12:04:48 | 显示全部楼层
发表于 2025-3-31 13:26:38 | 显示全部楼层
Reducing the Memory Complexity of Type-Inference Algorithmsl machine’s security mechanisms. One of the statically ensured properties is .. The type-inference phase is the overwhelming resource-consuming part of the verification process..This paper addresses the RAM bottleneck met while verifying mobile code in memory-constrained environments such as smart-c
发表于 2025-3-31 18:56:45 | 显示全部楼层
Password-Authenticated Key Exchange between Clients with Different Passwordsshared password. With a rapid change in modern communication environments, it is necessary to construct a secure end-to-end channel between clients, which is a quite different paradigm from the existing ones. In this paper we propose a new framework which provides a password-authenticated key exchan
发表于 2025-3-31 23:47:38 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-6 13:02
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表