找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Computer Security -- ESORICS 2009; 14th European Sympos Michael Backes,Peng Ning Conference proceedings 2009 Springer-Verlag Berlin Heidelb

[復(fù)制鏈接]
樓主: 尖酸好
11#
發(fā)表于 2025-3-23 12:15:41 | 只看該作者
https://doi.org/10.1007/978-981-10-7632-9t regulations (e.g., the Sarbanes-Oxley act and the Securities and Exchange Commission rule) mandate secure retention of important business records for several years. We provide a mechanism to authenticate bulk repositories of archived documents. In our approach, a space efficient local data structu
12#
發(fā)表于 2025-3-23 17:54:41 | 只看該作者
Homocysteine in Occlusive Vascular Diseaseous methods are all limited in analyzing only plain-text communications wherein the exchanged messages are not encrypted. In this paper, we propose ReFormat, a system that aims at deriving the message format even when the message is encrypted. Our approach is based on the observation that an encrypt
13#
發(fā)表于 2025-3-23 19:50:58 | 只看該作者
14#
發(fā)表于 2025-3-24 01:32:19 | 只看該作者
15#
發(fā)表于 2025-3-24 02:48:11 | 只看該作者
16#
發(fā)表于 2025-3-24 06:53:48 | 只看該作者
User-Centric Handling of Identity Agent Compromisefor users. We believe that an identity management system (IdMS) that empowers users to become aware of how and when their identity credentials are used is critical for the success of such online services. Furthermore, rapid revocation and recovery of potentially compromised credentials is desirable.
17#
發(fā)表于 2025-3-24 14:00:59 | 只看該作者
The Coremelt Attackt the victim host against undesired traffic..We present Coremelt, a new attack mechanism, where attackers only send traffic between each other, and not towards a victim host. As a result, none of the attack traffic is unwanted. The Coremelt attack is powerful because among . attackers, there are .(.
18#
發(fā)表于 2025-3-24 17:16:30 | 只看該作者
Lightweight Opportunistic Tunneling (LOT)ld automatically and securely establish efficient tunnel, encapsulating packets sent between them. This allows . to discard packets which use .’s network addresses but were not sent via . (i.e. are spoofed) and vice verse..LOT is practical: it is easy to manage (‘plug and play’, no coordination betw
19#
發(fā)表于 2025-3-24 21:18:10 | 只看該作者
Hide and Seek in Time — Robust Covert Timing Channelsrk communication. Previous results used encoding mechanisms that are either easy to detect with statistical analysis, thus spoiling the purpose of a covert channel, and/or are highly sensitive to channel noise, rendering them useless in practice. In this paper, we introduce a novel covert timing cha
20#
發(fā)表于 2025-3-25 02:53:21 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-7 14:48
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
西藏| 贡嘎县| 普兰县| 久治县| 洱源县| 正蓝旗| 怀来县| 渑池县| 阿坝县| 雷波县| 田阳县| 大荔县| 安泽县| 长沙市| 湖北省| 昆明市| 临高县| 龙山县| 南昌县| 濮阳市| 石狮市| 夏邑县| 田林县| 察雅县| 泾源县| 镇江市| 台中县| 荆门市| 杨浦区| 叙永县| 敦化市| 宣汉县| 门头沟区| 桑植县| 桃园市| 宁武县| 滁州市| 营山县| 丁青县| 石门县| 霍邱县|