標(biāo)題: Titlebook: Applied Cryptography in Computer and Communications; First EAI Internatio Bo Chen,Xinyi Huang Conference proceedings 2021 ICST Institute fo [打印本頁(yè)] 作者: cerebellum 時(shí)間: 2025-3-21 18:51
書(shū)目名稱Applied Cryptography in Computer and Communications影響因子(影響力)
書(shū)目名稱Applied Cryptography in Computer and Communications影響因子(影響力)學(xué)科排名
書(shū)目名稱Applied Cryptography in Computer and Communications網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Applied Cryptography in Computer and Communications網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Applied Cryptography in Computer and Communications被引頻次
書(shū)目名稱Applied Cryptography in Computer and Communications被引頻次學(xué)科排名
書(shū)目名稱Applied Cryptography in Computer and Communications年度引用
書(shū)目名稱Applied Cryptography in Computer and Communications年度引用學(xué)科排名
書(shū)目名稱Applied Cryptography in Computer and Communications讀者反饋
書(shū)目名稱Applied Cryptography in Computer and Communications讀者反饋學(xué)科排名
作者: champaign 時(shí)間: 2025-3-21 22:29 作者: 草本植物 時(shí)間: 2025-3-22 04:01 作者: 可忽略 時(shí)間: 2025-3-22 08:32 作者: 玉米棒子 時(shí)間: 2025-3-22 08:57
Thi Quynh Huong Luu,Thi Ngoc Diep Hoangce (PSP) auction for optimally allocating divisible resources while ensuring truthfulness with a Nash Equilibrium. Finally, we conduct experiments to validate the performance of private auction system ..作者: 煤渣 時(shí)間: 2025-3-22 13:44 作者: 嘮叨 時(shí)間: 2025-3-22 20:04
Kathleen Heugh,Xuan Li,Ying SongMetadata is obscured in the presented OSN and end-to-end encryption is used for secure communication. Additionally, communication channels are concealed like in mix networks such that adversaries cannot determine which user is accessing which data or which user is communicating with whom even with f作者: 左右連貫 時(shí)間: 2025-3-23 00:23
https://doi.org/10.1007/978-3-319-51976-0achieve PDE, which suits the resource-limited wearable devices; and 2) relies on various sensors equipped with the wearable devices to input passwords, rather than requiring users to enter them via a keyboard or a touchscreen. Security analysis and experimental evaluation using a real-world prototyp作者: 陳列 時(shí)間: 2025-3-23 02:15 作者: Limerick 時(shí)間: 2025-3-23 06:58 作者: 戲法 時(shí)間: 2025-3-23 11:41 作者: metropolitan 時(shí)間: 2025-3-23 16:27
A Security Enhanced Key Management Service for ARM Pointer Authentication kernel-space and user-space programs. Based on the scheme, we have implemented a prototype among the ARM Trusted Firmware, and also an enhanced backward-edge CFI solution. The evaluation shows that it introduces a reasonable and acceptable performance overhead, while provides better security guaran作者: 其他 時(shí)間: 2025-3-23 18:58
Privacy-Preserving ECC-Based Three-Factor Authentication Protocol for Smart Remote Vehicle Control Stocol has many security attributes that it not only can protect users’ anonymity and untraceability, but also resist many known attacks. And performance analysis shows that our protocol can run efficiently in SRVC system. Lastly, we conclude our work and give the future research direction in SVRC.作者: 救護(hù)車 時(shí)間: 2025-3-23 23:13
Efficient and Private Divisible Double Auction in Trusted Execution Environmentce (PSP) auction for optimally allocating divisible resources while ensuring truthfulness with a Nash Equilibrium. Finally, we conduct experiments to validate the performance of private auction system ..作者: 一回合 時(shí)間: 2025-3-24 05:22 作者: 下級(jí) 時(shí)間: 2025-3-24 07:29 作者: 脫離 時(shí)間: 2025-3-24 13:24
MobiWear: A Plausibly Deniable Encryption System for Wearable Mobile?Devicesachieve PDE, which suits the resource-limited wearable devices; and 2) relies on various sensors equipped with the wearable devices to input passwords, rather than requiring users to enter them via a keyboard or a touchscreen. Security analysis and experimental evaluation using a real-world prototyp作者: correspondent 時(shí)間: 2025-3-24 16:38
Using Smart Contracts to Improve Searchable Symmetric Encryptionication without searching all documents. Smart contracts use computing resources effectively and help us better search the blockchain. All information is recorded on the blockchain and will not be tampered with. In addition, integrity verification and smart contracts slightly reduce the efficiency b作者: intercede 時(shí)間: 2025-3-24 20:30 作者: 自負(fù)的人 時(shí)間: 2025-3-25 03:05 作者: 反抗者 時(shí)間: 2025-3-25 05:45 作者: 大笑 時(shí)間: 2025-3-25 09:23
https://doi.org/10.1057/9780230234086 the major criticisms of the current DNS. Many works suggest introducing the blockchain into DNS, but the existing blockchain-based DNSs do not support the domain name auction that is important for the domain name transfer. To solve this problem, we in this paper propose a blockchain-based sealed-bi作者: 性別 時(shí)間: 2025-3-25 14:27 作者: 浪費(fèi)物質(zhì) 時(shí)間: 2025-3-25 19:06 作者: 妨礙 時(shí)間: 2025-3-25 23:29
Thi Quynh Huong Luu,Thi Ngoc Diep Hoangxtensively studied. In particular, divisible double auction allows both buyers and sellers to dynamically submit their prices until convergence. However, severe privacy concerns may arise in the double auctions since all the agents may have to disclose their sensitive data such as the bid profiles (作者: Malfunction 時(shí)間: 2025-3-26 01:51 作者: 貪婪地吃 時(shí)間: 2025-3-26 04:44 作者: 棲息地 時(shí)間: 2025-3-26 09:17
Kathleen Heugh,Xuan Li,Ying Songcreasingly concerned that their data will end up in the hands of strangers or that personal data may even be misused. Secure OSNs can help. These often use encryption to keep the communication between the participants incomprehensible to outsiders. However, participants in such social networks canno作者: HEDGE 時(shí)間: 2025-3-26 12:53
https://doi.org/10.1007/978-3-319-51976-0ged in the mobile devices. To protect sensitive data, encryption is often used but, traditional encryption is vulnerable to coercive attacks in which the device owner is coerced by the adversary to disclose the decryption key. To defend against the coercive attacks, Plausibly Deniable Encryption (PD作者: Notorious 時(shí)間: 2025-3-26 17:10 作者: 精確 時(shí)間: 2025-3-26 21:24
The Opening of Southern Trades,als from an operation center before consumption. According to the credentials, consumers can use the corresponding amount of electricity. Based on the dynamic .-times anonymous authentication protocol, the scheme can achieve thieves identification and privacy preservation at the same time without th作者: 不真 時(shí)間: 2025-3-27 04:22 作者: 推遲 時(shí)間: 2025-3-27 08:09
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engihttp://image.papertrans.cn/a/image/159759.jpg作者: 天文臺(tái) 時(shí)間: 2025-3-27 13:02 作者: 衰弱的心 時(shí)間: 2025-3-27 17:05 作者: 代理人 時(shí)間: 2025-3-27 18:07
Applied Cryptography in Computer and Communications978-3-030-80851-8Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: 新義 時(shí)間: 2025-3-27 23:40 作者: 不確定 時(shí)間: 2025-3-28 03:54
A Novel Approach for Code Smells Detection Based on Deep LearningCompared to software bugs, code smells are more significant in software engineering research. It is not easy to detect code smells through traditional methods. In this work, we propose a novel code smells detection approach based on deep learning. The experiments show that our work achieves high scores in terms of F2 score.作者: HAVOC 時(shí)間: 2025-3-28 07:11
Anchor: An NDN-Based Blockchain Networks are usually characterized by a high communication overhead and redundant traffics which adversely impact the transaction/block latency and security. In the networking community, remarkable progresses have been made in past decades on network efficiency. In particular, information-centric networkin作者: 招募 時(shí)間: 2025-3-28 13:58
An Identity-Based Blind Signature and Its Application for Privacy Preservation in?Bitcoinarchitectures. To protect the privacy of users in Bitcoin, a number of mechanisms have been proposed, where mixing service is a simple and frequently-used mechanism. The work, named Blindcoin, believes that an . blind signature scheme can help to guarantee the anonymity of users at the mixer side. R作者: 寡頭政治 時(shí)間: 2025-3-28 16:17 作者: 惰性氣體 時(shí)間: 2025-3-28 22:33
A Security Enhanced Key Management Service for ARM Pointer Authenticationrity (CFI) is one of the most effective and popular solution, and integrated with the modish hardware makes it even more valuable, for instance, the ARM Pointer Authentication (PA), which can generate a message authentication code for a pointer and verify it to ensure the pointer is intact. However,作者: 沙漠 時(shí)間: 2025-3-28 23:22
Privacy-Preserving ECC-Based Three-Factor Authentication Protocol for Smart Remote Vehicle Control Sands which allows people to remotely control vehicles through the Internet. However, SVRC’s convenience brings security challenges that the related SRVC’s protocol needs to be enhanced with identity authentication mechanism for both users and their vehicles, in case of illegal intrusion without iden作者: Ophthalmologist 時(shí)間: 2025-3-29 04:42
Efficient and Private Divisible Double Auction in Trusted Execution Environmentxtensively studied. In particular, divisible double auction allows both buyers and sellers to dynamically submit their prices until convergence. However, severe privacy concerns may arise in the double auctions since all the agents may have to disclose their sensitive data such as the bid profiles (作者: 評(píng)論性 時(shí)間: 2025-3-29 09:53
Parallel Implementation and Optimization of SM4 Based on CUDAf SM4 is given. Based on the characteristics of CUDA (Compute Unified Device Architecture), a CPU-GPU (Central Processing Unit-Graphics Processing Unit) scheme of SM4 is proposed by exploiting the structure property. Moreover, this scheme is further improved by introducing the page-locked memory and作者: 暗指 時(shí)間: 2025-3-29 13:21
Another Algebraic Decomposition Method for Masked Implementationation of block ciphers has been attracting active research. It is an obstacle to efficient masked implementation that the complexity of an evaluation of multiplication is quadratic in the order of masking. A direct approach to this problem is to explore methods to reduce the number of multiplication作者: 破裂 時(shí)間: 2025-3-29 18:06 作者: gregarious 時(shí)間: 2025-3-29 23:21
MobiWear: A Plausibly Deniable Encryption System for Wearable Mobile?Devicesged in the mobile devices. To protect sensitive data, encryption is often used but, traditional encryption is vulnerable to coercive attacks in which the device owner is coerced by the adversary to disclose the decryption key. To defend against the coercive attacks, Plausibly Deniable Encryption (PD作者: 蓋他為秘密 時(shí)間: 2025-3-30 03:42
Recent Advances in the Web PKI and the Technical Challenges in SCMSadvances in the Web PKI include certificate transparency and push-based revocation, which improve the trustworthiness and performance of TLS and HTTPS, respectively. Meanwhile, SCMS is a specialized PKI system designed for V2V communications. In this paper, we analyze the design principles of certif作者: 門窗的側(cè)柱 時(shí)間: 2025-3-30 07:33
A Thieves Identification Scheme for Prepaid Systems in Smart Gridsals from an operation center before consumption. According to the credentials, consumers can use the corresponding amount of electricity. Based on the dynamic .-times anonymous authentication protocol, the scheme can achieve thieves identification and privacy preservation at the same time without th作者: Congestion 時(shí)間: 2025-3-30 11:58 作者: 進(jìn)取心 時(shí)間: 2025-3-30 14:51 作者: 閹割 時(shí)間: 2025-3-30 18:56
https://doi.org/10.1007/978-981-19-2169-8t) scheme of SM4 is proposed by exploiting the structure property. Moreover, this scheme is further improved by introducing the page-locked memory and CUDA streams. The results show that: SM4 optimized parallel implementation under GPU can obtain with a speed-up ratio of 89, and the throughput can reach up?to 31.41?Gbps.