找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Security Applications; 5th International Wo Chae Hoon Lim,Moti Yung Conference proceedings 2005 Springer-Verlag Berlin Heidelbe

[復(fù)制鏈接]
樓主: notable
51#
發(fā)表于 2025-3-30 10:35:17 | 只看該作者
Encrypted Watermarks and Linux Laptop Securityloop device, known as CryptoLoop. We demonstrate clear weaknesses in the current CBC-based implementation of CryptoLoop, perhaps the most surprising being a very simple attack which allows specially watermarked files to be identified on an encrypted hard disk without knowledge of the secret encrypti
52#
發(fā)表于 2025-3-30 12:29:12 | 只看該作者
Inconsistency Detection of Authorization Policies in Distributed Component Environmenthereas the components are distributed to an application server on a network with their authorization policies. It is necessary to detect inconsistency between the authorization policies of the RBAC server and the distributed components to guarantee the authorization policy integrity while system con
53#
發(fā)表于 2025-3-30 20:20:03 | 只看該作者
54#
發(fā)表于 2025-3-30 22:44:13 | 只看該作者
Public Key Encryption with Conjunctive Field Keyword Searchut the document. An email gateway, for example, may be desired to test whether the email contains a keyword “urgent” so that it could route the email accordingly, without leaking any content to the gateway. This mechanism was referred as . [4]. Similarly, a user may want to enable an email gateway t
55#
發(fā)表于 2025-3-31 01:49:15 | 只看該作者
A Probabilistic Method for Detecting Anomalous Program Behaviore order and the kind of system calls. We focus on a non-sequential feature of system calls given from a program. We apply a Bayesian network to predicting the .-th system call from the sequence of system calls of the length .–1. In addition, we show that a correlation between several kinds of system
56#
發(fā)表于 2025-3-31 08:21:25 | 只看該作者
57#
發(fā)表于 2025-3-31 13:08:34 | 只看該作者
58#
發(fā)表于 2025-3-31 15:23:41 | 只看該作者
59#
發(fā)表于 2025-3-31 20:39:16 | 只看該作者
60#
發(fā)表于 2025-3-31 21:47:42 | 只看該作者
Efficient Authenticated Key Agreement Protocol for Dynamic Groupsed key agreement protocol (EGAKA), which is designed to be fully distributed and fault-tolerant, provides efficient dynamic group membership management, mutual authentication among group members and is secure against both passive and active attacks. The features of EGAKA are as follows: Firstly, EGA
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-25 14:47
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
广丰县| 塔城市| 阿城市| 乌苏市| 绥江县| 灵武市| 保靖县| 崇仁县| 蒲江县| 静海县| 哈尔滨市| 胶南市| 二手房| 鄂州市| 棋牌| 苍山县| 东兰县| 元谋县| 洪湖市| 黑水县| 科技| 汶上县| 宽甸| 蓬莱市| 新田县| 监利县| 崇州市| 霞浦县| 金湖县| 涟水县| 宁河县| 永平县| 泗阳县| 浏阳市| 宜兰市| 苏尼特右旗| 齐齐哈尔市| 利川市| 寻甸| 旌德县| 辛集市|