找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Network and System Security; 6th International Co Li Xu,Elisa Bertino,Yi Mu Conference proceedings 2012 Springer-Verlag Berlin Heidelberg 2

[复制链接]
楼主: 搭话
发表于 2025-3-26 21:54:51 | 显示全部楼层
发表于 2025-3-27 04:30:55 | 显示全部楼层
Estimating the Number of Hosts Corresponding to an Address while Preserving Anonymityallocation of addresses and the prohibition of access to privacy sensitive data that can reveal user identities and remove anonymity. We propose a probabilistic method that strikes a desired balance between . and .. By utilising the phenomenon of preferential attachment, we show that the number of h
发表于 2025-3-27 05:52:00 | 显示全部楼层
Efficient and Robust Identity-Based Handoff Authentication in Wireless Networksr chameleon hash function serves as the primary ingredient. Compared with all the existing identity-based handoff-related schemes, the main advantage of the proposed scheme eliminates the assumption that PKG is fully trusted. Besides, we show that the proposed scheme not only provides robust securit
发表于 2025-3-27 12:42:55 | 显示全部楼层
An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wryptographic algorithms and erasure correction codes (ECCs) to SVC video streams such that the authenticated streams are format compliant with the SVC specifications and preserve the three dimensional scalability (i. e., spatial, quality and temporal) of the original streams. We implement our scheme
发表于 2025-3-27 14:19:50 | 显示全部楼层
The Performance of Public Key-Based Authentication Protocols them, there have been several techniques and protocols to integrate public key cryptography into Kerberos. Public-Key Cross Realm Authentication in Kerberos (PKCROSS) is one of these protocols. It has been proposed to simplify the administrative burden of maintaining cross-realm keys so that it imp
发表于 2025-3-27 20:59:10 | 显示全部楼层
Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net its guarantee of unconditionally perfect ballot secrecy. It satisfies self-tallying, fairness and verifiability. Disruption of the result of an election equals to breaking the Discrete Logarithm Problem. Our scheme is built on top of the DC-net(dining cryptographers network) anonymous broadcast pro
发表于 2025-3-28 01:21:12 | 显示全部楼层
Resilience Strategies for Networked Malware Detection and Remediationscales in which human reaction is unlikely to be effective. Research on worm detection has produced many approaches to identifying them. A common approach is to identify a worm’s signature. However, as worms continue to evolve, this method is incapable of detecting and mitigating new worms in real t
发表于 2025-3-28 03:50:05 | 显示全部楼层
发表于 2025-3-28 07:51:21 | 显示全部楼层
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/n/image/662892.jpg
发表于 2025-3-28 14:01:09 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-22 09:28
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表