找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information and Communications Security; 12th International C Miguel Soriano,Sihan Qing,Javier López Conference proceedings 2010 Springer B

[復(fù)制鏈接]
樓主: Thoracic
41#
發(fā)表于 2025-3-28 15:01:50 | 只看該作者
42#
發(fā)表于 2025-3-28 19:34:26 | 只看該作者
CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization The contributions of this paper are twofold: first, to investigate the characteristics and security requirements of CUDA-enabled cloud computing nodes; and, second, to provide an architecture for leveraging CUDA hardware resources in a secure virtualization environment, to improve cloud security wi
43#
發(fā)表于 2025-3-29 01:05:27 | 只看該作者
SEIP: Simple and Efficient Integrity Protection for Open Mobile Platformsns while still achieves a high assurance of platform integrity. SEIP is deployed within a commercially available Linux-based smartphone and demonstrates that it can effectively prevent certain malware. The security policy of our implementation is less than 20kB, and a performance study shows that it
44#
發(fā)表于 2025-3-29 06:36:00 | 只看該作者
Compromise-Resilient Anti-jamming for Wireless Sensor Networkse network will generate a new group key to be shared only by all non-compromised nodes. After that, the insider jammer is revoked and will be unable to predict the future communication channels used by non-compromised nodes. We implement and evaluate our solution using the Mica2 Mote platform and sh
45#
發(fā)表于 2025-3-29 09:37:17 | 只看該作者
Cryptographic Hash Functions: Theory and Practiceis invested in this topic was rather limited. From the hundred designs published before 2005, about 80% was cryptanalyzed; this includes widely used hash functions such as MD4 and MD5. Moreover, serious shortcomings have been identified in the theoretical foundations of existing designs. In response
46#
發(fā)表于 2025-3-29 12:22:13 | 只看該作者
47#
發(fā)表于 2025-3-29 19:34:51 | 只看該作者
Fine-Grained Disclosure of Access Policies evaluation of (certified or uncertified) properties, that clients can present. Since assuming the client to know a-priori the properties she should present to acquire access is clearly limiting, servers should be able to respond to client requests with information on the access control policies reg
48#
發(fā)表于 2025-3-29 19:49:58 | 只看該作者
49#
發(fā)表于 2025-3-30 01:17:21 | 只看該作者
50#
發(fā)表于 2025-3-30 07:25:57 | 只看該作者
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts schemes suffer from either long ciphertexts with size linear in the number of authorized users or can only achieve non-adaptive security. A non-adaptive attacker is assumed to disclose her target attacking set of users even before the system parameters are published. The notion of non-adaptive secu
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-25 10:40
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
广灵县| 罗山县| 和静县| 民乐县| 凌云县| 黄冈市| 绥宁县| 西盟| 南投市| 宝兴县| 习水县| 徐闻县| 宝坻区| 恩施市| 沙雅县| 溧水县| 光泽县| 基隆市| 闽侯县| 灌云县| 湘潭市| 舟曲县| 习水县| 龙门县| 吉水县| 什邡市| 乐至县| 呈贡县| 尖扎县| 苏尼特右旗| 宁远县| 昌江| 寿阳县| 五河县| 沈丘县| 梧州市| 无棣县| 平江县| 金乡县| 麟游县| 宜良县|