找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Computer Security - ESORICS 2010; 15th European Sympos Dimitris Gritzalis,Bart Preneel,Marianthi Theohari Conference proceedings 2010 Sprin

[復(fù)制鏈接]
樓主: 變成小松鼠
11#
發(fā)表于 2025-3-23 09:44:01 | 只看該作者
Flexible Scheduler-Independent Securityopment of a novel scheduler-independent information flow property was the identification of a suitable class of schedulers that covers the most relevant schedulers. The contributions of this article include a novel security property, a scheduler independence result, and a provably sound program analysis.
12#
發(fā)表于 2025-3-23 14:27:19 | 只看該作者
Secure Multiparty Linear Programming Using Fixed-Point Arithmetic a variant of the simplex algorithm and secure computation with fixed-point rational numbers, optimized for this type of application. We present the main protocols as well as performance measurements for an implementation of our solution.
13#
發(fā)表于 2025-3-23 19:08:29 | 只看該作者
14#
發(fā)表于 2025-3-24 01:08:35 | 只看該作者
Sequential Protocol Composition in Maude-NPAation, we are able to analyze and verify this dynamic composition in the current Maude-NPA tool. We prove soundness and completeness of the protocol transformation with respect to the extended operational semantics, and illustrate our results on some examples.
15#
發(fā)表于 2025-3-24 05:32:58 | 只看該作者
https://doi.org/10.1007/978-94-011-0229-2anism (which can be extended to a progressive one) and using unlinkable credentials, digital cash, and zero knowledge proofs of knowledge, we present a solution that prevents anyone, even the tax authority, from knowing which accounts belong to which users, or from being able to link any account to another or to purchases or deposits.
16#
發(fā)表于 2025-3-24 07:29:39 | 只看該作者
The Clinical Applications of SPETprivacy for such a zone. We give a set of necessary conditions for any mix-zone protocol to preserve privacy. We analyse, using the tool ProVerif, a particular proposal for key distribution in mix-zones, the CMIX protocol. We show that in many scenarios it does not preserve privacy, and we propose a fix.
17#
發(fā)表于 2025-3-24 11:11:59 | 只看該作者
The Clinical Applications of SPETorks. Finally, based on the protocol of [20], we propose an efficient RFID mutual authentication protocol and analyze its security and privacy. The methodology used in our analysis can also be applied to analyze other RFID protocols within the new framework.
18#
發(fā)表于 2025-3-24 16:18:21 | 只看該作者
19#
發(fā)表于 2025-3-24 22:05:14 | 只看該作者
0302-9743 has a tradition that goes back two decades. It tries to bring together the international research community in a top-quality event that covers all the areas of computer security, ranging from theory to applications. ESORICS 2010 was the 15th edition of the event. It was held in Athens, Greece, Septe
20#
發(fā)表于 2025-3-25 02:56:29 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-8 21:28
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
古交市| 广丰县| 平顺县| 阜宁县| 溆浦县| 宽城| 中方县| 思茅市| 贵州省| 鱼台县| 白城市| 南平市| 宁武县| 泾川县| 滁州市| 新竹县| 肃宁县| 永宁县| 舒兰市| 胶南市| 临颍县| 博湖县| 绥中县| 溆浦县| 萨迦县| 普兰县| 奎屯市| 木里| 新河县| 调兵山市| 枣阳市| 武定县| 石景山区| 浑源县| 陇南市| 建水县| 射阳县| 吉首市| 秦安县| 大足县| 乌恰县|