找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Computer Security - ESORICS 2010; 15th European Sympos Dimitris Gritzalis,Bart Preneel,Marianthi Theohari Conference proceedings 2010 Sprin

[復(fù)制鏈接]
樓主: 變成小松鼠
11#
發(fā)表于 2025-3-23 09:44:01 | 只看該作者
Flexible Scheduler-Independent Securityopment of a novel scheduler-independent information flow property was the identification of a suitable class of schedulers that covers the most relevant schedulers. The contributions of this article include a novel security property, a scheduler independence result, and a provably sound program analysis.
12#
發(fā)表于 2025-3-23 14:27:19 | 只看該作者
Secure Multiparty Linear Programming Using Fixed-Point Arithmetic a variant of the simplex algorithm and secure computation with fixed-point rational numbers, optimized for this type of application. We present the main protocols as well as performance measurements for an implementation of our solution.
13#
發(fā)表于 2025-3-23 19:08:29 | 只看該作者
14#
發(fā)表于 2025-3-24 01:08:35 | 只看該作者
Sequential Protocol Composition in Maude-NPAation, we are able to analyze and verify this dynamic composition in the current Maude-NPA tool. We prove soundness and completeness of the protocol transformation with respect to the extended operational semantics, and illustrate our results on some examples.
15#
發(fā)表于 2025-3-24 05:32:58 | 只看該作者
https://doi.org/10.1007/978-94-011-0229-2anism (which can be extended to a progressive one) and using unlinkable credentials, digital cash, and zero knowledge proofs of knowledge, we present a solution that prevents anyone, even the tax authority, from knowing which accounts belong to which users, or from being able to link any account to another or to purchases or deposits.
16#
發(fā)表于 2025-3-24 07:29:39 | 只看該作者
The Clinical Applications of SPETprivacy for such a zone. We give a set of necessary conditions for any mix-zone protocol to preserve privacy. We analyse, using the tool ProVerif, a particular proposal for key distribution in mix-zones, the CMIX protocol. We show that in many scenarios it does not preserve privacy, and we propose a fix.
17#
發(fā)表于 2025-3-24 11:11:59 | 只看該作者
The Clinical Applications of SPETorks. Finally, based on the protocol of [20], we propose an efficient RFID mutual authentication protocol and analyze its security and privacy. The methodology used in our analysis can also be applied to analyze other RFID protocols within the new framework.
18#
發(fā)表于 2025-3-24 16:18:21 | 只看該作者
19#
發(fā)表于 2025-3-24 22:05:14 | 只看該作者
0302-9743 has a tradition that goes back two decades. It tries to bring together the international research community in a top-quality event that covers all the areas of computer security, ranging from theory to applications. ESORICS 2010 was the 15th edition of the event. It was held in Athens, Greece, Septe
20#
發(fā)表于 2025-3-25 02:56:29 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-9 05:21
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
梁平县| 板桥市| 平塘县| 耿马| 布尔津县| 林州市| 娱乐| 淅川县| 鄱阳县| 广元市| 宜君县| 丰台区| 抚松县| 苍山县| 漳平市| 绥化市| 定远县| 深州市| 长白| 仲巴县| 昂仁县| 启东市| 且末县| 兴山县| 宁安市| 贡嘎县| 邵武市| 本溪| 博兴县| 和政县| 高密市| 蒙自县| 东山县| 瓮安县| 鸡东县| 丹阳市| 凤冈县| 巴林左旗| 谷城县| 中方县| 若尔盖县|