找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security Standardisation Research; Second International Liqun Chen,Shin‘ichiro Matsuo Conference proceedings 2015 Springer International Pu

[复制链接]
楼主: 战神
发表于 2025-3-26 23:37:32 | 显示全部楼层
Analysis of the PKCS#11 API Using the Maude-NPA Toolices such as smartcards and Hardware Security Modules (HSMs). However, several Crypto APIs have been shown to be subject to attacks in which sensitive information is disclosed to an attacker, such as the RSA Laboratories Public Key Standards PKCS#11, an API widely adopted in industry. Recently, ther
发表于 2025-3-27 02:24:10 | 显示全部楼层
How to Manipulate Curve Standards: A White Paper for the Black Hat ,by an attacker; (2) the attacker is aware of a vulnerability in some curves that are not publicly known to be vulnerable..This cost includes the cost of exploiting the vulnerability, but also the initial cost of computing a curve suitable for sabotaging the standard. This initial cost depends heavil
发表于 2025-3-27 09:17:17 | 显示全部楼层
Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks against key substitution attacks is also of interest, and has been considered for several practical digital signature schemes such as DSA and ECDSA. In this paper, we consider . key substitution attacks where the base element is considered as a part of the public key and can be substituted. We firs
发表于 2025-3-27 10:52:05 | 显示全部楼层
发表于 2025-3-27 14:09:42 | 显示全部楼层
Improving Air Interface User Privacy in Mobile Telephony with respect to user privacy. A number of possible modifications to 2G, 3G and 4G protocols have been proposed designed to provide greater user privacy; however, they all require significant alterations to the existing deployed infrastructures, which are almost certainly impractical to achieve in p
发表于 2025-3-27 19:35:23 | 显示全部楼层
Generating Unlinkable IPv6 Addresses, existing schemes for address autoconfiguration do not adequately consider the full context in which they might be implemented, in particular the impact of low quality random number generation. This can have a fundamental impact on the privacy property of unlinkability, one of the design goals of a
发表于 2025-3-27 23:37:36 | 显示全部楼层
A Practical Trust Framework: Assurance Levels Repackaged Through Analysis of Business Scenarios and referred to as entity authentication assurance, and its degree is often called LoA (levels of assurance, or assurance levels). There are two prominent LoA standards: NIST SP800-63-2 and ISO/IEC 29115:2013. LoAs are designed to express different levels of assurance. Multiple viewpoints are set in as
发表于 2025-3-28 02:42:44 | 显示全部楼层
发表于 2025-3-28 09:26:47 | 显示全部楼层
Formal Support for Standardizing Protocols with Statetood foundations, exist for the design and analysis of protocols that rely purely on message passing. However, these tools encounter difficulties when faced with protocols that rely on non-local, mutable state to coordinate several local sessions..We adapt one of these tools, ., to provide automated
发表于 2025-3-28 11:42:43 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-15 09:24
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表