找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security Protocols XXV; 25th International W Frank Stajano,Jonathan Anderson,Vashek Matyáš Conference proceedings 2017 Springer Internation

[复制链接]
楼主: obsess
发表于 2025-3-26 21:48:30 | 显示全部楼层
Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System (Transcript ofkinds of things that can go wrong, I used Shodan to search for an existing Industrial Control System connected to the Internet. I gave my first version of this talk in March 2016, and have given it a couple of times in the interim. Each time I prepared for the talk, I revisited the ICS, and each tim
发表于 2025-3-27 03:57:18 | 显示全部楼层
,Assuring the Safety of Asymmetric Social Protocols,, Nigerian scams and the like) is carried out by abusing social protocols—that is to say, computer-mediated interactions between human subjects. We call a social protocol “asymmetric” when the initial sender benefits from execution of the protocol but the recipient is not guaranteed against dishones
发表于 2025-3-27 07:31:44 | 显示全部楼层
发表于 2025-3-27 12:12:27 | 显示全部楼层
发表于 2025-3-27 14:34:44 | 显示全部楼层
发表于 2025-3-27 20:08:26 | 显示全部楼层
Making Decryption Accountable,. We describe a protocol that forces decryptors to create such information. The information can’t be discarded or suppressed without detection. The protocol relies on a trusted hardware device. We describe some applications.
发表于 2025-3-28 01:41:17 | 显示全部楼层
Making Decryption Accountable (Transcript of Discussion),t tell my parents where I was going because I wanted my privacy. But my parents naturally wanted to make sure that they’d have some recourse if I don’t come back at the expected time. They wanted security in other words. We hit upon a compromise whereby I would put my plans in an envelope, and leave
发表于 2025-3-28 05:43:48 | 显示全部楼层
发表于 2025-3-28 07:30:29 | 显示全部楼层
Key Exchange with the Help of a Public Ledger,stency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman or ECDH. Essentially, the MitM attack creates an inconsistency in the world views of the two honest parties, and they can detect it with the help of the ledger. Thus, there is no need for prior k
发表于 2025-3-28 11:07:51 | 显示全部楼层
,Reconciling Multiple Objectives – Politics or Markets?,ems. At the deepest level, security protocols determine the power structure of a system: who can do what with whom. The development, adoption, spread and evolution of protocols, and competition between them, are both political and economic activities. They may reconcile multiple objectives or be the
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-14 16:03
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表