找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information and Communications Security; 16th International C Lucas C. K. Hui,S. H. Qing,S. M. Yiu Conference proceedings 2015 Springer Int

[复制链接]
楼主: Agoraphobia
发表于 2025-3-28 17:59:52 | 显示全部楼层
Privacy-Preserving Distance-Bounding Proof-of-Knowledge,ave numerous applications including authentication and proximity checking. The privacy problem in . protocols was limited to privacy against . adversaries. Gambs . [.] extended this limitation and proposed a protocol that provides . privacy when the verifier is malicious, or . registration authority
发表于 2025-3-28 22:17:09 | 显示全部楼层
Distance Lower Bounding,applications in secure authentication and location based services. We consider the dual problem of distance lower bounding (DLB), where the prover proves it is outside a distance bound to the verifier. We motivate this problem through a number of application scenarios, and model security against dis
发表于 2025-3-29 02:59:04 | 显示全部楼层
Efficient Adaptive Oblivious Transfer Without ,-type Assumptions in UC Framework,arty computation protocols, the efficiency and security are two big issues in its design. In this paper, we present an efficient, . (UC) secure adaptive oblivious transfer without .-.. The proposed protocol is UC secure under Decision Linear (DLIN), Decision Bilinear Diffie-Hellman (DBDH) and Square
发表于 2025-3-29 06:15:37 | 显示全部楼层
发表于 2025-3-29 07:42:22 | 显示全部楼层
发表于 2025-3-29 11:30:53 | 显示全部楼层
发表于 2025-3-29 19:20:22 | 显示全部楼层
Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR Processors,ms to fit resource-limited embedded systems. In this paper, we describe optimization techniques to speed up multi-precision multiplication and squaring on the AVR ATmega series of 8-bit microcontrollers. First, we present a new approach to perform multi-precision multiplication, called ., that resem
发表于 2025-3-29 21:25:09 | 显示全部楼层
New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security,ructions of IBE schemes, the one proposed by Boneh and Boyen (in Eurocrypt 2004) is quite important from both practical and theoretical points of view. The scheme was standardized as IEEE P1363.3 and is the basis for many subsequent constructions. In this paper, we investigate its multi-challenge se
发表于 2025-3-30 03:07:26 | 显示全部楼层
Method for Determining Whether or not Text Information Is Leaked from Computer Display Through Elecains text information, this paper proposed an evaluation method without reconstructing the displayed image. In this method, sparse decomposition in wavelet is used to describe the characteristics of electromagnetic radiation signals contain text information. By using this method, it is easy to detec
发表于 2025-3-30 07:16:01 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-4 20:31
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表