找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security and Privacy in the Age of Ubiquitous Computing; IFIP TC11 20th Inter Ryoichi Sasaki,Sihan Qing,Hiroshi Yoshiura Conference proceed

[复制链接]
楼主: 无限
发表于 2025-3-25 06:52:05 | 显示全部楼层
Secure Human Communications Based on Biometrics Signalsentication schemes require communicating parties either share a secret/password or know each other’s public key. In this paper we suggest a novel user authentication scheme that is easy to use and overcomes the requirements of sharing password or public keys. Our scheme allows two human users to per
发表于 2025-3-25 08:51:56 | 显示全部楼层
Distance-Bounding Proof of Knowledge to Avoid Real-Time Attackshe context of pervasive computing, it is additionally required to verify the physical proximity of the authenticated party in order to avoid a set of real-time attacks. Brands and Chaum proposed distance-bounding protocols as a way to compute a practical upper bound on the distance between a prover
发表于 2025-3-25 13:54:00 | 显示全部楼层
An Adaptive Polling Scheme for IEEE 802.11 Wireless LANnsider the traffic characteristics such as time bound traffic, null poll, and priority. In the case of time bounded traffic, PCF must evolve to support degrees of priority. In this paper, we proposed an adaptive polling scheme to increase the performance of wireless LANs. Moreover, we focused to a p
发表于 2025-3-25 18:57:52 | 显示全部楼层
发表于 2025-3-25 21:27:31 | 显示全部楼层
发表于 2025-3-26 01:09:08 | 显示全部楼层
Protecting Consumer Data in Composite Web Servicesth untrusted online vendors. The system extends to support protection of customer privacy when multiple vendors interact in composite web services. A . is introduced for safe execution of sensitive customer information in a protected environment and provides accountability in the case of disputed transactions.
发表于 2025-3-26 07:28:45 | 显示全部楼层
发表于 2025-3-26 09:17:44 | 显示全部楼层
发表于 2025-3-26 14:10:18 | 显示全部楼层
Distance-Bounding Proof of Knowledge to Avoid Real-Time Attackssucceeds to perform the distance-bounding process. However, frauds where a malicious prover and an intruder collaborate to cheat a verifier have been left as an open issue. In this paper, we provide a solution preventing both types of attacks.
发表于 2025-3-26 18:56:57 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-23 04:06
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表