找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Information and Communications Security; 11th International C Sihan Qing,Chris J. Mitchell,Guilin Wang Conference proceedings 2009 Springer

[復(fù)制鏈接]
樓主: 契約
11#
發(fā)表于 2025-3-23 11:25:55 | 只看該作者
A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate Pay-TV, DVD, etc. In order to discourage the legitimate subscribers from giving away their decryption keys, the traitor tracing scheme comes up. In this paper, we propose a public-key traitor tracing scheme that has optimal transmission rate. In other words, our scheme enables everyone to transmit
12#
發(fā)表于 2025-3-23 16:34:07 | 只看該作者
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor n channels. However, all the existing self-healing group key distribution schemes in the literature are designed for homogenous WSNs that do not scale. In contract, heterogeneous WSNs have better scalability and performance. We are thus motivated to study self-healing group key distribution for hete
13#
發(fā)表于 2025-3-23 21:50:49 | 只看該作者
14#
發(fā)表于 2025-3-23 22:50:30 | 只看該作者
15#
發(fā)表于 2025-3-24 06:07:28 | 只看該作者
Secure Remote Execution of Sequential Computationshe first contribution that addresses the security of generic sequential computations. By dividing sequential tasks into smaller subtasks and permuting them among participants, we show that our scheme facilitates the insertion of selective redundancy and/or pre-computed functions (.) that are indisti
16#
發(fā)表于 2025-3-24 09:35:17 | 只看該作者
Architecture- and OS-Independent Binary-Level Dynamic Test Generationstatements, and of using a constraint solver to infer new program inputs from previous constraints in order to steer next executions towards new program paths. Variants of this technique have recently been adopted in finding security vulnerabilities in binary level software. However, such existing a
17#
發(fā)表于 2025-3-24 12:26:27 | 只看該作者
Measuring Information Flow in Reactive Processesctive labelled transition system with input-output actions. Second, we present the language and semantics for simple reactive processes, and investigate the quantified information flow analysis over this semantics. Third, we define a metric over the semantics and then present a method to compute the
18#
發(fā)表于 2025-3-24 15:44:54 | 只看該作者
19#
發(fā)表于 2025-3-24 22:41:21 | 只看該作者
20#
發(fā)表于 2025-3-25 00:19:54 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-2-5 11:10
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
哈尔滨市| 乳山市| 铜山县| 北辰区| 于都县| 桐乡市| 闵行区| 正宁县| 海淀区| 汝阳县| 宁武县| 息烽县| 拉萨市| 延川县| 香河县| 荥阳市| 四子王旗| 宁南县| 嘉兴市| 离岛区| 呼玛县| 饶阳县| 濉溪县| 武胜县| 江源县| 嘉祥县| 双桥区| 南木林县| 遂川县| 南华县| 南投县| 浮山县| 永定县| 中山市| 常宁市| 阆中市| 绵阳市| 韩城市| 拉孜县| 潼关县| 保山市|