標(biāo)題: Titlebook: Information Security Theory and Practice; 12th IFIP WG 11.2 In Olivier Blazy,Chan Yeob Yeun Conference proceedings 2019 IFIP International [打印本頁] 作者: 我要黑暗 時間: 2025-3-21 17:31
書目名稱Information Security Theory and Practice影響因子(影響力)
書目名稱Information Security Theory and Practice影響因子(影響力)學(xué)科排名
書目名稱Information Security Theory and Practice網(wǎng)絡(luò)公開度
書目名稱Information Security Theory and Practice網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Security Theory and Practice被引頻次
書目名稱Information Security Theory and Practice被引頻次學(xué)科排名
書目名稱Information Security Theory and Practice年度引用
書目名稱Information Security Theory and Practice年度引用學(xué)科排名
書目名稱Information Security Theory and Practice讀者反饋
書目名稱Information Security Theory and Practice讀者反饋學(xué)科排名
作者: CLAN 時間: 2025-3-21 21:08
Secure Outsourcing in Discrete-Logarithm-Based and Pairing-Based Cryptography (Invited Talk)ally computing (including the secret inputs and outputs). We briefly review the recent advances on secure outsourcing of group exponentiation (in groups of known prime order as well as in groups of unknown order) and pairing computation.作者: mighty 時間: 2025-3-22 03:00
Remote Credential Management with Mutual Attestation for Trusted Execution Environmentsn this work, we present novel protocols using mutual attestation for supporting four aspects of secure remote credential management with TEEs: ., ., ., and .. The proposed protocols are agnostic to the underlying TEE implementation and subjected to formal verification using Scyther, which found no attacks.作者: Coronary 時間: 2025-3-22 08:38
Generating a Real-Time Constraint Engine for Network Protocolschanisms to generate the constraint engine code. Comparing the autogenerated version against a manually implemented, optimized version of the constraint engine indicates no significant difference in terms of their performance.作者: ENDOW 時間: 2025-3-22 10:35
On the Non-repudiation of Isogeny Based Signature Scheme signature which threaten the non-repudiation of GPS signature. We also suggest how to prevent key substitution attack in general as well as our attack in this paper. We also present an example of our attack using Sage to illustrate isogenies of elliptic curves and our attack.作者: 碌碌之人 時間: 2025-3-22 13:45 作者: conduct 時間: 2025-3-22 17:54
Conference proceedings 2019P 2018, held in Brussels, Belgium, in December 2018...The 13 revised full papers and 2 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: real world; cryptography; artificial learning; cybersecurity; and Intern作者: Amenable 時間: 2025-3-22 21:21 作者: painkillers 時間: 2025-3-23 05:05 作者: CANT 時間: 2025-3-23 07:19 作者: 光亮 時間: 2025-3-23 10:23 作者: 光明正大 時間: 2025-3-23 17:12 作者: Arrhythmia 時間: 2025-3-23 18:55 作者: 極端的正確性 時間: 2025-3-24 00:10
978-3-030-20073-2IFIP International Federation for Information Processing 2019作者: 使成核 時間: 2025-3-24 03:41
Information Security Theory and Practice978-3-030-20074-9Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Introvert 時間: 2025-3-24 06:44
https://doi.org/10.1007/978-3-030-20074-9access control; artificial intelligence; authentication; automotive security; classification; computer ne作者: 解凍 時間: 2025-3-24 11:15 作者: 鞠躬 時間: 2025-3-24 18:28
f the increase of migrant flows, with women increasingly migrating as independent migrants in their own rights. This change of migration dynamics is also observable in Southern Africa. As the standards of living continue to deteriorate within some Southern African countries, women have also been for作者: Indelible 時間: 2025-3-24 23:00 作者: 斜坡 時間: 2025-3-24 23:51
Damien Vergnaudion. Financial problems and failures on the US financial market in autumn 2008 almost immediately contaminated financial systems and institutions worldwide. The practical meaning of theoretically defined concepts like ‘systemic risk’ and particularly ‘counterparty risk’ and ‘liquidity risk’ became v作者: vasospasm 時間: 2025-3-25 03:47
Etienne Tehrani,Jean-Luc Danger,Tarik Grabadecision making patterns. Providing an interdisciplinary and international perspective with a rich research and practical outlook, this work is an important contribution to the field of crisis management and decision making. Offering essential understanding to how countries, organizations, groups an作者: tangle 時間: 2025-3-25 08:32 作者: Albinism 時間: 2025-3-25 15:34 作者: Wernickes-area 時間: 2025-3-25 19:41 作者: 終點(diǎn) 時間: 2025-3-25 20:58 作者: 粗語 時間: 2025-3-26 03:16 作者: 大量 時間: 2025-3-26 05:21
Generic Architecture for Lightweight Block Ciphers: A First Step Towards Agile Implementation of Muled Encryption Standard (AES), hardly fits the resource restrictions of those small and pervasive devices. From this observation a plethora of Lightweight Block Ciphers have been proposed. Every algorithm has its own advantages in terms of security, complexity, latency, performances. This paper prese作者: Inveterate 時間: 2025-3-26 08:54 作者: 使虛弱 時間: 2025-3-26 13:47 作者: 暗語 時間: 2025-3-26 17:52
Efficient Information Theoretic Multi-party Computation from Oblivious Linear Evaluationwithout letting the sender learn the evaluation point. OLE is a special case of oblivious polynomial evaluation (OPE) which was first introduced by Naor and Pinkas in 1999. In this article we utilise OLE for the purpose of computing multiplication in multi-party computation (MPC)..MPC allows a set o作者: Ruptured-Disk 時間: 2025-3-27 00:34 作者: Glycogen 時間: 2025-3-27 02:06
Prediction-Based Intrusion Detection System for In-Vehicle Networks Using Supervised Learning and Ounterfaces, all communicating over shared internal communication buses. The cyber-physical architecture based on this ECU network has been proven vulnerable to multiple types of attacks leveraging remote, direct and indirect physical access. Attacks initiated from these access vectors go through the 作者: bile648 時間: 2025-3-27 06:40
Deep Learning Application in Security and Privacy – Theory and Practice: A Position Papera heterogeneous group of hardware, software, services, and organisations. Such infrastructure faces a diverse range of challenges to its operations that include security, privacy, resilience, and quality of services. Among these, cybersecurity and privacy are taking the centre-stage, especially sinc作者: Infiltrate 時間: 2025-3-27 12:16 作者: FECK 時間: 2025-3-27 15:52 作者: Diaphragm 時間: 2025-3-27 18:06
Detection of Bitcoin-Based Botnets Using a One-Class Classifiertackers have built C&C (Command and Control) infrastructures on top of popular Internet services such as Skype and Bitcoin. In this work, we propose an approach to detect botnets with C&C infrastructures based on the Bitcoin network. First, transactions are grouped according to the users that issued作者: omnibus 時間: 2025-3-28 00:41
e environment across the regional borders and beyond. This requires collaboration of states and the business community to facilitate such a policy to ensure transformation and economic recovery in the region. Besides states collaborative support, capabilities and technical support (including infrast作者: 一瞥 時間: 2025-3-28 03:17 作者: Iniquitous 時間: 2025-3-28 07:46 作者: Nucleate 時間: 2025-3-28 11:47
Damien Vergnaudubstantially larger number of banks would have entered into bankruptcy than actually did so. Lind-blom, Olsson and Willesson (2011) report that the guarantee programme introduced into the Swedish market had already been utilized from the start by domestic banks in general, and by one of the four lar作者: 樹上結(jié)蜜糖 時間: 2025-3-28 16:10 作者: abolish 時間: 2025-3-28 21:30
Mohamed Sami Rakha,Fahim T. Imam,Thomas R. Dean—and thus clarify—the concept. Particular cultures have been patterned, and universal claims been made, based on diverse samples of cultures. Nevertheless, these attempts have not eliminated disagreement on how ‘culture’ should be defined; whether it has a meaningful effect on society; or whether it作者: hemophilia 時間: 2025-3-29 02:44 作者: 焦慮 時間: 2025-3-29 05:31 作者: Truculent 時間: 2025-3-29 09:29
Efficient Information Theoretic Multi-party Computation from Oblivious Linear Evaluation paper we introduce an OLE-based MPC protocol which also relies on some precomputed information..Our proposed protocol has a more efficient communication complexity than Beaver’s protocol by a multiplicative factor of .. Furthermore, to compute a share to a multiplication, a participant in our proto作者: 親密 時間: 2025-3-29 12:13 作者: 變量 時間: 2025-3-29 18:25 作者: 威脅你 時間: 2025-3-29 23:29
Cybersecurity Behaviour: A Conceptual Taxonomythis study is the identification and categorisation of home user cybersecurity behaviour. The identification and classification of more cybersecurity behaviour is aimed to have a positive impact in the creation of strategic interventions to change and maintain good cybersecurity behaviour.作者: sparse 時間: 2025-3-30 02:26 作者: 門窗的側(cè)柱 時間: 2025-3-30 06:03 作者: 付出 時間: 2025-3-30 08:55
Julia A. Meister,Raja Naeem Akram,Konstantinos Markantonakis作者: wangle 時間: 2025-3-30 14:19
Carlton Shepherd,Raja Naeem Akram,Konstantinos Markantonakis作者: 比喻好 時間: 2025-3-30 18:37
Bruno Bogaz Zarpel?o,Rodrigo Sanches Miani,Muttukrishnan Rajarajan作者: 仇恨 時間: 2025-3-30 21:40