標(biāo)題: Titlebook: Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems; 7th IFIP WG 11.2 Int Lorenzo Cavallaro,Dieter Goll [打印本頁] 作者: hearken 時(shí)間: 2025-3-21 20:06
書目名稱Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems影響因子(影響力)
書目名稱Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems影響因子(影響力)學(xué)科排名
書目名稱Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems網(wǎng)絡(luò)公開度
書目名稱Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems被引頻次
書目名稱Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems被引頻次學(xué)科排名
書目名稱Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems年度引用
書目名稱Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems年度引用學(xué)科排名
書目名稱Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems讀者反饋
書目名稱Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems讀者反饋學(xué)科排名
作者: engrave 時(shí)間: 2025-3-21 23:44 作者: 胖人手藝好 時(shí)間: 2025-3-22 03:36
A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cardstations of the abstraction layer running on a Java Card prototype. Two implementations use software checks that are optimized for either memory consumption or execution speed. The third implementation accelerates the run-time verification process by using the dedicated hardware protection units of the Java Card.作者: Macronutrients 時(shí)間: 2025-3-22 04:58
Conference proceedings 2013 and Privacy of Mobile Devices in Wireless Communication, WISTP 2013, held in Heraklion, Crete, Greece, in May 2013. The 9 revised full papers presented together withtwo keynote speeches were carefully reviewed and selected from 19 submissions. The scope of the workshop spans the theoretical aspects作者: exophthalmos 時(shí)間: 2025-3-22 09:44
Multiplicative Homomorphic E-Auction with Formally Provable Securitys efficient bid re-formatting to enforce bid validity. Another contribution of the new multiplicative homomorphic e-auction scheme is that it is the first e-auction scheme to provide formal and comprehensive security analysis to achieve formally provable security (especially privacy).作者: miracle 時(shí)間: 2025-3-22 16:23 作者: 按時(shí)間順序 時(shí)間: 2025-3-22 18:23 作者: ASSET 時(shí)間: 2025-3-22 23:49 作者: 雇傭兵 時(shí)間: 2025-3-23 02:09 作者: 磨坊 時(shí)間: 2025-3-23 06:52
A Forward Privacy Model for RFID Authentication Protocolssilient to the above information leakage simultaneously in the Paise-Vaudenay security model. We review the existing result and extend the Juels-Weis security model to satisfy these properties by using a suitable restriction. Moreover, we give two example protocols that satisfy the modified security model.作者: ULCER 時(shí)間: 2025-3-23 10:20 作者: Formidable 時(shí)間: 2025-3-23 16:53 作者: hankering 時(shí)間: 2025-3-23 19:36
Lorenzo Cavallaro,Dieter GollmannFast-track conference proceedings of WIST 2013作者: chlorosis 時(shí)間: 2025-3-24 00:19
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465345.jpg作者: PAGAN 時(shí)間: 2025-3-24 03:56 作者: organic-matrix 時(shí)間: 2025-3-24 08:26 作者: 聽覺 時(shí)間: 2025-3-24 11:32
https://doi.org/10.1007/978-3-642-38530-8attacks; computer networks; mobile devices; privacy; socio-technical systems作者: Confess 時(shí)間: 2025-3-24 15:11
Multiplicative Homomorphic E-Auction with Formally Provable Securityvantage is obvious and useful in practice: efficient distributed private key generation and thus efficient trust sharing. A long existing problem in homomorphic e-auction, inefficiency of bid validity check, is solved in the new multiplicative homomorphic e-auction scheme in this paper, which employ作者: subacute 時(shí)間: 2025-3-24 19:31 作者: Original 時(shí)間: 2025-3-24 23:54 作者: 可互換 時(shí)間: 2025-3-25 05:28
URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Securityired. This work describes how the detection and analysis of widely distributed and security critical ad-ware plugins is achieved. We show, how users can trigger bytecode rewriting to (de)activate selected or redundant permissions in Android applications without sacrificing functionality. The paper a作者: Ingratiate 時(shí)間: 2025-3-25 08:17
Online Banking with NFC-Enabled Bank Card and NFC-Enabled Smartphoneed with a Smartphone and prefer to not carry a card reader in addition. Methods where developed that use the Smartphone to authorize online banking transactions. These methods are vulnerable to Smartphone malware. We present NFC-TAN as a Smartphone method that combines the two requirements: Strong c作者: 倔強(qiáng)一點(diǎn) 時(shí)間: 2025-3-25 13:09
A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cardsrds to change the control and data flow of the Java Card Virtual Machine. These attacks confuse the Java type system, jump to forbidden code or remove run-time security checks. This work introduces a novel security layer for a defensive Java Card Virtual Machine to counteract fault attacks. The adva作者: bioavailability 時(shí)間: 2025-3-25 18:04 作者: 到婚嫁年齡 時(shí)間: 2025-3-25 22:52 作者: CUR 時(shí)間: 2025-3-26 02:59 作者: 形上升才刺激 時(shí)間: 2025-3-26 04:29 作者: 損壞 時(shí)間: 2025-3-26 11:04 作者: collagenase 時(shí)間: 2025-3-26 15:12
Henrich C. P?hls,Stefan Peters,Kai Samelin,Joachim Posegga,Hermann de Meeresearch on textbooks.Lays out conceptual issues and methodol.The critical analysis of science textbooks is vital in improving teaching and learning at all levels in the subject, and this volume sets out a range of academic perspectives on how that analysis should be done. Each chapter focuses on an 作者: 狂熱文化 時(shí)間: 2025-3-26 19:07 作者: groggy 時(shí)間: 2025-3-26 22:45
Daniel Schreckling,Stephan Huber,Focke H?hne,Joachim Posegga of academic perspectives on how that analysis should be done. Each chapter focuses on an aspect of science textbook appraisal, with coverage of everything from theoretical and philosophical underpinnings, methodological issues, and conceptual frameworks for critical analysis, to practical technique作者: 蕨類 時(shí)間: 2025-3-27 03:53 作者: MOT 時(shí)間: 2025-3-27 07:07
Michael Lackner,Reinhard Berlach,Wolfgang Raschke,Reinhold Weiss,Christian Stegeresearch on textbooks.Lays out conceptual issues and methodol.The critical analysis of science textbooks is vital in improving teaching and learning at all levels in the subject, and this volume sets out a range of academic perspectives on how that analysis should be done. Each chapter focuses on an 作者: 手術(shù)刀 時(shí)間: 2025-3-27 12:50 作者: hegemony 時(shí)間: 2025-3-27 17:05 作者: 釋放 時(shí)間: 2025-3-27 20:29
Pierre Dusart,Sinaly Traorén. Households analyzed as assemblages engage three central concepts: emergence, agency, and relations of externality. Emergence concerns the household as assembled event that constantly unfolds, rather than any fixed and stable entity. Agency in this perspective is symmetric, analyzed as a property 作者: generic 時(shí)間: 2025-3-28 00:25 作者: puzzle 時(shí)間: 2025-3-28 02:49
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems7th IFIP WG 11.2 Int作者: aspersion 時(shí)間: 2025-3-28 06:36
Daniel Schreckling,Stephan Huber,Focke H?hne,Joachim Poseggaooks such as their treatment of controversial issues, graphical depictions, scientific historiography, vocabulary usage, accuracy, and readability. The content also covers broader social themes such as the portrayal of women and minorities.."Despite newer, more active pedagogies, textbooks continue 作者: CARE 時(shí)間: 2025-3-28 13:51