找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Information and Communications Security; 17th International C Sihan Qing,Eiji Okamoto,Dongmei Liu Conference proceedings 2016 Springer Inte

[復(fù)制鏈接]
樓主: exterminate
31#
發(fā)表于 2025-3-27 00:00:14 | 只看該作者
Minimizing Databases Attack Surface Against SQL Injection Attacks,ploit, to gain access to this data, SQL injections are considered one of the most serious vulnerabilities, which remain at the top twenty most known vulnerabilities more than a decade. Though various defenses have been proposed against SQL injections for database protection, most of them require “mo
32#
發(fā)表于 2025-3-27 04:10:01 | 只看該作者
33#
發(fā)表于 2025-3-27 07:23:00 | 只看該作者
34#
發(fā)表于 2025-3-27 13:04:59 | 只看該作者
On Promise Problem of the Generalized Shortest Vector Problem,problem associated with estimating the subspace avoiding minimum. We show . lies in ., where . is a constant. Furthermore, we study relationships between . of a lattice and the .th successive minimum, the shortest basis, and the shortest vector in the dual of the saturated sublattice, and obtain new
35#
發(fā)表于 2025-3-27 16:44:35 | 只看該作者
,Secret Key Extraction with Quantization Randomness Using Hadamard Matrix on?QuaDRiGa Channel,iation and privacy amplification. Despite the tremendous researches of quantization and information reconciliation techniques, there is little consideration about the risk of information reconstruction by the unauthorized node due to the high correlation of subsequent quantization bits, which is una
36#
發(fā)表于 2025-3-27 20:02:45 | 只看該作者
Practical Lattice-Based Fault Attack and Countermeasure on SM2 Signature Algorithm,ce attack presented in SAC’2013 and fault attack against SM2 in practice. We successfully utilize the laser fault attack to skip the instructions of nonces being written into RAM, so that the nonces in signatures share partial same bits from each other. Next, we build the model of lattice attack and
37#
發(fā)表于 2025-3-27 22:22:35 | 只看該作者
38#
發(fā)表于 2025-3-28 02:56:17 | 只看該作者
How to Vote Privately Using Bitcoin,enough to setup digital contracts whose fund transfer can be enforced automatically..In this paper, we design protocols for the bitcoin voting problem, in which there are . voters, each of which wishes to fund exactly one of two candidates . and .. The winning candidate is determined by majority vot
39#
發(fā)表于 2025-3-28 09:39:44 | 只看該作者
Multidimensional Zero-Correlation Linear Cryptanalysis on 23-Round LBlock-s,he same as LBlock except that the former adopts an improved key schedule algorithm with better diffusion property. Using the shifting relation of certain subkeys derived by the new key schedule algorithm, we present a multidimensional zero-correlation linear cryptanalysis on 23-round LBlock-s. The t
40#
發(fā)表于 2025-3-28 12:33:32 | 只看該作者
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-Resistant Blackbox Traceabsatisfying the policies are generally . by multiple users. If a malicious user, with his attributes shared with multiple other users, created a decryption blackbox for sale, this malicious user could be difficult to identify from the blackbox. Hence in practice, a useful CP-ABE scheme should have so
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-2-2 01:18
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
阳山县| 阳西县| 伊吾县| 临夏市| 哈密市| 精河县| 喜德县| 文登市| 台南市| 眉山市| 淮安市| 泌阳县| 于田县| 农安县| 巢湖市| 合阳县| 新建县| 丹东市| 宜章县| 合作市| 贵南县| 新余市| 余江县| 布拖县| 安新县| 儋州市| 东方市| 观塘区| 扎赉特旗| 荣成市| 都安| 平顺县| 望江县| 涟源市| 云龙县| 和田市| 巴青县| 温泉县| 福贡县| 山丹县| 阿瓦提县|