標(biāo)題: Titlebook: Information Security; 15th International C Dieter Gollmann,Felix C. Freiling Conference proceedings 2012 Springer-Verlag Berlin Heidelberg [打印本頁(yè)] 作者: 祈求 時(shí)間: 2025-3-21 17:01
書目名稱Information Security影響因子(影響力)
作者: 能得到 時(shí)間: 2025-3-21 20:38
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465261.jpg作者: 反饋 時(shí)間: 2025-3-22 00:32 作者: 歡呼 時(shí)間: 2025-3-22 07:59 作者: 葡萄糖 時(shí)間: 2025-3-22 09:29 作者: 難取悅 時(shí)間: 2025-3-22 14:08 作者: 符合規(guī)定 時(shí)間: 2025-3-22 18:01
Differential Attacks on Reduced RIPEMD-160tandard RIPEMD-160 was proposed 15 years ago and may be used as a drop-in replacement for SHA-1 due to their same hash output length. Only few results have been published for RIPEMD-160 so far and most attacks have a complexity very close to the generic bound. In this paper, we present the first app作者: nascent 時(shí)間: 2025-3-22 23:58 作者: 領(lǐng)巾 時(shí)間: 2025-3-23 01:33
On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree small inverse problems with higher degree. The problem is a natural extension of small secret exponent attack on RSA cryptosystem introduced by Boneh and Durfee. They reduced this attack to solving a bivariate modular equation: ., where . is a given integer and . is a public exponent. They proved t作者: 愛(ài)好 時(shí)間: 2025-3-23 08:23
Strong Authentication with Mobile Phone The capacity of the human memory does not scale to the ever larger number of ever stronger passwords needed for these services. Single sign-on (SSO) systems help users cope with password fatigue, but SSO systems still mostly lack support for strong two-factor authentication. At the same time, the u作者: hegemony 時(shí)間: 2025-3-23 14:18
Domain-Specific Pseudonymous Signatures for the German Identity Cardindividual service providers, but not across different service providers (even not malicious ones). The protocol can be augmented to allow also for signatures under the pseudonyms. In this paper, we thus view —and define— this idea more abstractly as a new cryptographic signature primitive with some作者: ANTIC 時(shí)間: 2025-3-23 20:25 作者: arcane 時(shí)間: 2025-3-24 00:27
100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocksbution (KPD) is regarded as one of the best option for key management in WSN. This work analyzes an existing work by Simonova et al. that makes use of deployment knowledge where the deployment zone consists of clusters of nodes. Transversal design (TD) based KPD scheme of Lee and Stinson is used to 作者: Acetabulum 時(shí)間: 2025-3-24 04:10
Learning Fine-Grained Structured Input for Memory Corruption Detectioncould serve as accurate and reliable signatures for detecting memory corruptions. In this paper, we propose a novel approach to detect memory corruptions at the binary level. The basic insight is that different parts of an input are usually processed in different ways, e.g., by different instruction作者: 粗糙濫制 時(shí)間: 2025-3-24 06:33
Dynamic Anomaly Detection for More Trustworthy Outsourced Computationfts computation from its private to its public part, it must trust the public part to execute the computation as intended. We show how public-cloud providers can use dynamic anomaly detection to increase their clients’ trust in outsourced computations. The client first defines the computation’s refe作者: flex336 時(shí)間: 2025-3-24 11:28 作者: DECRY 時(shí)間: 2025-3-24 15:10
Collaboration-Preserving Authenticated Encryption for Operational Transformation Systemsument-editing applications. In this setting, the goal is to provide security without modifying the web application’s client-side or server-side components. Instead, communication between both components is transparently intercepted and processed (if necessary) by means of a local proxy or browser pl作者: overrule 時(shí)間: 2025-3-24 21:16
Selective Document Retrieval from Encrypted Database server and perform efficient search remotely. We propose a new SDR scheme based on the recent advances in fully homomorphic encryption schemes. The proposed scheme is secure in our security model and can be adapted to support many useful search features, including aggregating search results, suppor作者: 方舟 時(shí)間: 2025-3-25 02:18 作者: Melodrama 時(shí)間: 2025-3-25 03:53
Secure Hierarchical Identity-Based Identification without Random Oraclesd concurrent attacks in the standard model. The proposed construction converts a digital signature scheme existentially unforgeable against chosen message attacks, where the scheme has a protocol for showing possession of signing key. Our construction is based on the so-called certificate-based cons作者: Banister 時(shí)間: 2025-3-25 10:05
Efficient Two-Move Blind Signatures in the Common Reference String Modelgner learning the message, or being able to link a signature to the protocol run via which it was obtained. In this paper, we construct a blind signature scheme that requires minimal interaction (two moves) between the user and the signer, and which yields standard signatures. The signature request 作者: Fulsome 時(shí)間: 2025-3-25 12:09
Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systemshow by examples that this approach can express constraints of practical interest. We present a compliance checker in the presence of usage-constraints, especially for trust negotiation systems. Given an . policy, the checker is able to find all minimal satisfying sets, each of which uses credentials作者: 一致性 時(shí)間: 2025-3-25 16:34
A Quantitative Approach for Inexact Enforcement of Security Policieser’s seminal work, there have been several approaches defining what kind of policies can be automatically enforced, and in particular, non-safety properties cannot be correctly and transparently enforced. In this paper, we first propose to build an enforcement mechanism using an abstract notion of s作者: Additive 時(shí)間: 2025-3-25 22:45 作者: 肉體 時(shí)間: 2025-3-26 02:40
Manas Pathak,Jose Portelo,Bhiksha Raj,Isabel Trancosoource of the spatio-temporal ‘common order of nature.’ For, as has been said, though . is the . of the . world of common experience and perception, this is no .,no eternal actuality, but an . or projection of . upon the reference-system of the microcosmic part, whereby . is at once relatively pulver作者: 逃避系列單詞 時(shí)間: 2025-3-26 04:19 作者: Kidnap 時(shí)間: 2025-3-26 08:59 作者: 間接 時(shí)間: 2025-3-26 13:04 作者: Hemodialysis 時(shí)間: 2025-3-26 20:32
Sanna Suoranta,André Andrade,Tuomas Auraich these are involved in a dialectic of emanation and emendation, to an examination of the nature, and the conditions governing, the resulting durational exposition of this dialectic, directing our attention primarily, though by no means exclusively, to durational . nature and life as exemplifying 作者: Meditate 時(shí)間: 2025-3-26 21:23 作者: 協(xié)迫 時(shí)間: 2025-3-27 01:19
Jens Bender,?zgür Dagdelen,Marc Fischlin,Dennis Küglerplicitly accomplished in the famous . to ..” of the .; and he notes with scarcely suppressed indignation that “the very word . or . hardly occurs anywhere in the ..” “Though Spinoza had fine things to say about the virtue of benevolence, he is curiously silent about the great virtue in which the con作者: Feckless 時(shí)間: 2025-3-27 05:38
Falko Strenzkeself-referent roots of durational emanation. In . the perfect mutuality which I have called ‘eternal .’ is not merely tentative, contingent, and normative, but throughout its entire amplitude constitutive, necessary, and essential. In ‘this present life5 of emanational privation, of durationally cor作者: 晚間 時(shí)間: 2025-3-27 10:04 作者: 心胸狹窄 時(shí)間: 2025-3-27 17:16
Lei Zhao,Debin Gao,Lina Wangplicitly accomplished in the famous . to ..” of the .; and he notes with scarcely suppressed indignation that “the very word . or . hardly occurs anywhere in the ..” “Though Spinoza had fine things to say about the virtue of benevolence, he is curiously silent about the great virtue in which the con作者: 女歌星 時(shí)間: 2025-3-27 17:51
Sami Alsouri,Jan Sinschek,Andreas Sewe,Eric Bodden,Mira Mezini,Stefan Katzenbeisserself-referent roots of durational emanation. In . the perfect mutuality which I have called ‘eternal .’ is not merely tentative, contingent, and normative, but throughout its entire amplitude constitutive, necessary, and essential. In ‘this present life’ of emanational privation, of durationally cor作者: GRE 時(shí)間: 2025-3-27 22:57 作者: Hla461 時(shí)間: 2025-3-28 05:40 作者: tenosynovitis 時(shí)間: 2025-3-28 09:41 作者: caldron 時(shí)間: 2025-3-28 13:20
Andreas Peter,Max Kronberg,Wilke Trei,Stefan Katzenbeisserplicitly accomplished in the famous . to .” of the .; and he notes with scarcely suppressed indignation that “the very word . or . hardly occurs anywhere in the .” “Though Spinoza had fine things to say about the virtue of benevolence, he is curiously silent about the great virtue in which the conce作者: 多山 時(shí)間: 2025-3-28 17:30 作者: chuckle 時(shí)間: 2025-3-28 18:48
Peter Drábik,Fabio Martinelli,Charles Morissetiation defects in oxides of alkali-earth metals.Is based on .The range of problems that can be solved with the use of powerful radiation installations is determined: generation of nanosecond ultrahigh-frequency (microwave) pulses, collective acceleration of charged particles, the implementation of a作者: 邊緣帶來(lái)墨水 時(shí)間: 2025-3-28 23:54
Privacy-Preserving Speaker Authenticationyptographic tools, or has cast authentication as a problem of exact match with compromised accuracy. In this paper we present a new technique that employs secure binary embeddings of feature vectors, to perform voice authentication in a privacy preserving manner with minimal computational overhead and little loss of classification accuracy.作者: Reservation 時(shí)間: 2025-3-29 03:27
An Empirical Study of Dangerous Behaviors in Firefox Extensions dynamic technique to track the behaviors of injected scripts and analyzed the impact of these scripts. We analyzed the behaviors of 2465 extensions and discussed their security implications. We also proposed a solution to mitigate indirect threats to web sessions.作者: antenna 時(shí)間: 2025-3-29 09:30 作者: Canyon 時(shí)間: 2025-3-29 12:53 作者: 動(dòng)機(jī) 時(shí)間: 2025-3-29 18:37 作者: GUISE 時(shí)間: 2025-3-29 20:02
0302-9743 rnational Conference on Information Security, ISC 2015, held in Passau, Germany, in September 2012. .The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptan作者: Definitive 時(shí)間: 2025-3-30 00:36 作者: 生來(lái) 時(shí)間: 2025-3-30 08:06 作者: flaggy 時(shí)間: 2025-3-30 10:28 作者: 協(xié)迫 時(shí)間: 2025-3-30 14:22 作者: Immortal 時(shí)間: 2025-3-30 19:48
Learning Fine-Grained Structured Input for Memory Corruption Detectionw that deviations from the execution pattern learned signal a memory corruption. We implement a prototype of our system and demonstrate its success in detecting a number of memory corruption attacks in the wild. In addition, we evaluate the overhead of our system and discuss its advantages over existing approaches and limitations.作者: 暖昧關(guān)系 時(shí)間: 2025-3-30 23:45
Selective Document Retrieval from Encrypted Databasen encrypted database with 1000 documents on a Linux server, and it demonstrates that our scheme is much more efficient, i.e., around 1250 times faster, than a solution based on the SSW scheme with similar security guarantees.作者: Rustproof 時(shí)間: 2025-3-31 03:18
Efficient Two-Move Blind Signatures in the Common Reference String Modelrelated assumption in bilinear groups; namely a new variant of the LRSW assumption. We provide evidence for the hardness of our new variant of the LRSW assumption by showing it is intractable in the generic group model.作者: myopia 時(shí)間: 2025-3-31 08:27 作者: 一窩小鳥(niǎo) 時(shí)間: 2025-3-31 10:55 作者: 高度表 時(shí)間: 2025-3-31 15:12 作者: 愛(ài)得痛了 時(shí)間: 2025-3-31 21:03
Florian Mendel,Tomislav Nad,Stefan Scherz,Martin Schl?ffer self-reference, but self-alienated, so that the emendation of his own defect must, ., be accommodated to the self-reference, more or less emended, of the other, in accordance with, and in part constituting, a durational moral order. Love towards one’s enemy, for example, is not properly expressed b作者: 莊嚴(yán) 時(shí)間: 2025-4-1 00:17 作者: CORD 時(shí)間: 2025-4-1 03:53
Noboru Kunihiroially synthetic, and that judgements that are truly ethical have ‘objective’ significance. I cannot hope, and will not pretend to attempt, to fulfil so large a programme in so small a space: at most I shall seek, in considering some of the more important problems that arise in connexion with a specu作者: NORM 時(shí)間: 2025-4-1 06:29 作者: Digitalis 時(shí)間: 2025-4-1 14:07 作者: frozen-shoulder 時(shí)間: 2025-4-1 17:37
Jens Bender,?zgür Dagdelen,Marc Fischlin,Dennis Küglerve inclination, is essential to the conception of morality, but though the simple moralist may rest content with the distinction, the philosopher is bound to inquire into its sources and ontological signification - very difficult metaphysical problems, the solution of which is not likely to leave th作者: ineffectual 時(shí)間: 2025-4-1 20:53 作者: HILAR 時(shí)間: 2025-4-2 00:14
Samiran Bag,Aritra Dhar,Pinaki Sarkar that it has been possible wholly to ignore the distinction of mental and physical in the discussions of Part I., the emphasis being almost wholly on the physical in Chapters III. and IV. and chiefly on the mental in Chapter V.; but in view of the widespread belief, or tacit assumption, that the mor作者: Offstage 時(shí)間: 2025-4-2 06:17
Lei Zhao,Debin Gao,Lina Wangve inclination, is essential to the conception of morality, but though the simple moralist may rest content with the distinction, the philosopher is bound to inquire into its sources and ontological signification - very difficult metaphysical problems, the solution of which is not likely to leave th