找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security and Privacy in New Computing Environments; 4th EAI Internationa Wenbo Shi,Xiaofeng Chen,Kim-Kwang Raymond Choo Conference proceedi

[复制链接]
楼主: 误解
发表于 2025-3-28 18:09:11 | 显示全部楼层
,BA-Audit: Blockchain-Based Public Auditing for Aggregated Data Sharing in Edge-Assisted IoT,ct and share data in edge-assisted IoT scenarios because traditional methods will exhaust bandwidth resources. Users need to verify the integrity of aggregated data to ensure security sharing. However, existing data auditing technologies are disabled because aggregate data has no metadata. This pape
发表于 2025-3-28 19:08:06 | 显示全部楼层
Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System,control. The USDOT (U.S. Department of Transportation) has sponsored a kind of such system - I-SIG based on Controlled Optimization of Phases (COP). Unfortunately, it has been revealed that a serious congestion attack can be caused just by one vehicle’s data spoofing. However, the existing methods f
发表于 2025-3-29 00:13:49 | 显示全部楼层
发表于 2025-3-29 05:24:44 | 显示全部楼层
System Business Affecting Impact Analysis Method with Crossover Probability Theory,ct analysis, an analysis method of system business affecting impact based on crossover probability theory is proposed. Firstly, the experts evaluate the relevance and influence of the business functions of the information system. Then quantify the correlation between system business functions, and g
发表于 2025-3-29 08:35:23 | 显示全部楼层
RAP: A Lightweight Application Layer Defense Against Website Fingerprinting, that are visited by users based on extracted features from the network traffic. There are currently defenses to reduce the threat of WFP, but these defense measures have some defects; some defenses are too expensive to deploy, and some have been defeated by stronger WFP attack methods. In this work
发表于 2025-3-29 12:47:40 | 显示全部楼层
Blockchain-Based Outsourcing Shared Car Risk Prediction Scheme Design,morphic encryption algorithm is used to realize the machine learning calculation in the ciphertext state. Finally, the SVM learning algorithm is used to make the risk prediction results of shared cars more accurate. Through performance analysis and comparison, the scheme is proved to have higher accuracy and security.
发表于 2025-3-29 16:17:31 | 显示全部楼层
An Improved Needham-Schroeder Session Key Distribution Protocol for In-Vehicle CAN Network,dom oracle model to conduct a formal security analysis of the proposed protocol, then we use Tamarin-Prover to verify the security properties of the protocol, the result indicates that the protocol is secure and applicable for in-vehicle CAN communication.
发表于 2025-3-29 23:07:18 | 显示全部楼层
发表于 2025-3-30 03:05:46 | 显示全部楼层
发表于 2025-3-30 04:25:48 | 显示全部楼层
System Business Affecting Impact Analysis Method with Crossover Probability Theory,nformation system, and the interaction relationship of each business of the system is associated. The experiment shows that this method can accurately measure the extent and trend of business interruption affecting other information system businesses.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-21 17:58
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表