找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Security and Privacy; 9th Australasian Con Huaxiong Wang,Josef Pieprzyk,Vijay Varadharajan Conference proceedings 2004 Springer

[復制鏈接]
樓主: nourish
31#
發(fā)表于 2025-3-26 23:26:36 | 只看該作者
Multi-service Oriented Broadcast Encryptiona threshold, a rekeying algorithm is proposed to update the user’s service memberships .. We formalize and prove the framework is dynamically secure under the random oracle model. We realize our framework with a scheme based on complete subtree method.
32#
發(fā)表于 2025-3-27 03:36:21 | 只看該作者
NGSCB: A Trusted Open Systemol and network authentication in mass market systems by authenticating executable code at all system layers. We have implemented a prototype of the system and expect the full system to be mass deployed.
33#
發(fā)表于 2025-3-27 07:27:34 | 只看該作者
Analysis of a Conference Scheme Under Active and Passive Attackss in the way that a colluding group of attackers can still obtain the conference key even after they all leave the conference. The passive attack does not need any attacker to ever participate in the conference. The conference key can be compromised with a large probability as long as the number of conferees is large.
34#
發(fā)表于 2025-3-27 12:36:05 | 只看該作者
35#
發(fā)表于 2025-3-27 16:20:39 | 只看該作者
Multi-service Oriented Broadcast Encryptionhis paper, we suggest a framework called . framework from the subset cover method [12] using RSA exponentiation technique. In this framework, each user’s secret storage is independent of the number of services. Service subscriptions and service providing can be efficiently processed. The service uns
36#
發(fā)表于 2025-3-27 19:26:20 | 只看該作者
37#
發(fā)表于 2025-3-28 00:32:10 | 只看該作者
Linear Code Implies Public-Key Traitor Tracing with ,urosawa–Desmedt scheme, can be derived from an [.,.,.]-linear code such that . ≥ 2.+1. In this paper, we show that the linear-coded Kurosawa–Desmedt scheme can be modified to allow revocation of users, that is to show a revocation scheme can be derived from a linear code. The overhead of the modifie
38#
發(fā)表于 2025-3-28 04:39:39 | 只看該作者
39#
發(fā)表于 2025-3-28 07:43:27 | 只看該作者
Single Database Private Information Retrieval with Logarithmic Communicationty and a solution with only logarithmic user-side communication complexity. Previously the best result could only achieve polylogarithmic communication on each side, and was based on certain less well-studied assumptions in number theory [6]. On the contrary, our schemes are based on Paillier’s cryp
40#
發(fā)表于 2025-3-28 11:49:13 | 只看該作者
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructionson the size of the predistributed data, as well as the size of the communications in any (one-round) protocol. We then show that these bounds are tight by exhibiting a scheme for oblivious polynomial evaluation achieveing all the lower bounds simultaneously. We also present a natural generalisation
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-25 07:21
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復 返回頂部 返回列表
永修县| 凤山市| 高邮市| 新余市| 虎林市| 当雄县| 渝北区| 乌兰察布市| 临西县| 镇原县| 百色市| 永福县| 娄烦县| 栾城县| 英山县| 韩城市| 吴江市| 海晏县| 宜昌市| 双江| 凤台县| 霍城县| 余姚市| 佛冈县| 福安市| 灵川县| 沛县| 淮安市| 井冈山市| 兴国县| 疏勒县| 星座| 青神县| 锦州市| 鹤岗市| 广安市| 团风县| 托克逊县| 香港| 开化县| 格尔木市|