找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Security and Cryptology - ICISC 2001; 4th International Co Kwangjo Kim Conference proceedings 2002 Springer-Verlag Berlin Heide

[復制鏈接]
樓主: DEBUT
51#
發(fā)表于 2025-3-30 10:41:48 | 只看該作者
52#
發(fā)表于 2025-3-30 14:16:46 | 只看該作者
Decentralized Event Correlation for Intrusion Detection,ct such attacks therefore have to collect and correlate information from different sources. We propose a completely decentralized approach to solve the task of event correlation and information fusing of data gathered from multiple points within the network..Our system models an intrusion as a patte
53#
發(fā)表于 2025-3-30 18:54:07 | 只看該作者
Enhancing the Security of Cookies, in a user’s shopping cart to authentication information used for accessing restricted pages. While cookies are clearly very useful, they can also be abused. In this paper, security threats that cookies can pose to a user are identified, as are the security requirements necessary to defeat them. Var
54#
發(fā)表于 2025-3-31 00:46:44 | 只看該作者
A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation,ack systems and servers by hackers very frequently. Recently, many researches tried to prevent it, and several solutions were developed such as Libsafe and StackGuard; however, these solutions have a few problems. In this paper we present a new stack buffer overflow attack prevention technique that
55#
發(fā)表于 2025-3-31 02:05:12 | 只看該作者
56#
發(fā)表于 2025-3-31 06:46:48 | 只看該作者
Binary Codes for Collusion-Secure Fingerprinting,iderations, the pirates’ probablity of success (which must be non-zero, as was shown by Boneh and Shaw) on one hand, and decoding complexity on the other. We show how to minimize the pirates’ probability of success: but the associated decoding complexity is .(. .), where . is the number of users. Ne
57#
發(fā)表于 2025-3-31 12:50:04 | 只看該作者
Copyright Protection of Object-Oriented Software,rmarks on three “orthogonal” levels. For the first level, watermarks are injected into objects. The second level watermarking is used to select proper variants of the source code. The third level uses transition function that can be used to generate copies with different functionalities. Generic wat
58#
發(fā)表于 2025-3-31 16:14:46 | 只看該作者
59#
發(fā)表于 2025-3-31 21:02:05 | 只看該作者
Slide Attacks with a Known-Plaintext Cryptanalysis,yzing on the other part, the key scheduling part, are known. A slide attack is an instance of attacks exploiting the key schedule weakness. In this paper, currently proposed slide attacks can be still enhanced so that all currently published known-plaintext analytic technique can be applied to small
60#
發(fā)表于 2025-3-31 23:49:03 | 只看該作者
Constructions of Cheating Immune Secret Sharing,submit invalid shares to the combiner. In the second one, the cheaters collectively decide which shares are to be modified so the combiner gets a mixture of valid and invalid shares from the cheaters. The secret scheme is said to be .-cheating immune if any group of . cheaters has no advantage over
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-2-7 05:56
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復 返回頂部 返回列表
萍乡市| 雅江县| 滕州市| 秦皇岛市| 乌兰县| 湟中县| 靖边县| 澜沧| 勐海县| 盐城市| 乌鲁木齐县| 拜城县| 增城市| 江都市| 水富县| 文水县| 老河口市| 襄垣县| 高州市| 桃园县| 万山特区| 顺昌县| 大姚县| 伊宁市| 福海县| 尼玛县| 霸州市| 溧水县| 平邑县| 襄城县| 北碚区| 安顺市| 鄂温| 五常市| 祁门县| 苍梧县| 慈利县| 惠州市| 阳春市| 桦川县| 新建县|