標題: Titlebook: Information and Communications Security; 12th International C Miguel Soriano,Sihan Qing,Javier López Conference proceedings 2010 Springer B [打印本頁] 作者: Thoracic 時間: 2025-3-21 16:26
書目名稱Information and Communications Security影響因子(影響力)
書目名稱Information and Communications Security影響因子(影響力)學科排名
書目名稱Information and Communications Security網(wǎng)絡公開度
書目名稱Information and Communications Security網(wǎng)絡公開度學科排名
書目名稱Information and Communications Security被引頻次
書目名稱Information and Communications Security被引頻次學科排名
書目名稱Information and Communications Security年度引用
書目名稱Information and Communications Security年度引用學科排名
書目名稱Information and Communications Security讀者反饋
書目名稱Information and Communications Security讀者反饋學科排名
作者: 無孔 時間: 2025-3-21 22:38
Rewriting of SPARQL/Update Queries for Securing Data Accessapproach based on rewriting SPARQL/Update queries. It involves two steps. The first one satisfies the update constraints. The second one handles consistency between select and update operators. Query rewriting is done by adding positive and negative filters (corresponding respectively to permissions and prohibitions) to the initial query.作者: hypnotic 時間: 2025-3-22 01:25 作者: 嫌惡 時間: 2025-3-22 05:13
Consecutive S-box Lookups: A Timing Attack on SNOW?3Gandardization consideration by ISO. Our results yield new insights into the secure design and implementation of ciphers with respect to side-channels. We also give results of a bit-slice implementation as a countermeasure.作者: BINGE 時間: 2025-3-22 12:06
Security Enhancement and Modular Treatment towards Authenticated Key Exchange is secure in the enhanced model. NACS is practical and efficient, since it reqires less exponentiations, and, more important, admits a tight security reduction with weaker standard cryptographic assumptions. Finally, the compact and elegant security proof of NACS shows that our method is reasonable and effective.作者: Paraplegia 時間: 2025-3-22 13:46
A New Method for Formalizing Optimistic Fair Exchange Protocolstypical optimistic fair exchange protocol, the article demonstrates the protocol analysis process in the new model. Two flaws were discovered and improved, which shows that the new method can be used to analyze the fairness and timeliness of optimistic fair exchange protocols.作者: apiary 時間: 2025-3-22 20:27
Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Schemee first propose a ., that is, a construction with multiple committers and verifiers. Consequently, three secure first-price auction protocols are proposed, each of which has its own properties. We also provide the security proof and the complexity analysis of proposed constructions.作者: Memorial 時間: 2025-3-22 23:40 作者: Notorious 時間: 2025-3-23 03:55
Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocoltwo messages are required to authenticate the MU. Moreover, we will demonstrate the strengths of this protocol against the common security attacks and we will compare the protocol performance with the previous protocols to ensure efficiency.作者: 拉開這車床 時間: 2025-3-23 09:15
Manger’s Attack Revisitedng differences that has not been addressed previously. We also investigate a new class of related problems in the multi-precision integer arithmetic that in principle allows a variant of Manger’s attack to be launched against RSA implementations on 8-bit and possibly 16-bit platforms.作者: mediocrity 時間: 2025-3-23 10:43
Efficient Authentication for Mobile and Pervasive Computingy taking advantage of the fact that the message to be authenticated must also be encrypted, we propose a computationally secure authentication code that is as efficient as an unconditionally secure authentication, without the need for impractically long keys.作者: 離開可分裂 時間: 2025-3-23 16:25 作者: 癡呆 時間: 2025-3-23 18:15
An Agent-Mediated Fair Exchange Protocoleaving the possible intermediaries out of the scope. In this paper we propose a Fair Exchange protocol for agent-mediated scenarios. We first present our model for agent-mediated scenarios and its requirements, we illustrate its usage with a motivating example, and then we present our proposal with a brief security analysis.作者: Nonporous 時間: 2025-3-23 23:15
Miguel Soriano,Sihan Qing,Javier LópezUnique visibility.State-of-the-art survey.Fast-track conference proceedings作者: SPECT 時間: 2025-3-24 03:51
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465885.jpg作者: entitle 時間: 2025-3-24 09:36
https://doi.org/10.1007/978-3-642-17650-0S-Box; Scantegrity; access control; adaptive security; anonymity; cryptography; integrity; intrusion detect作者: 原始 時間: 2025-3-24 11:46
On Practical Second-Order Power Analysis Attacks for Block Ciphers reduced complexity, produce the same result as the original one, without requiring any additional tool. The validity of the proposed variant is confirmed by experiments, whose results allow for a comparison between the two approaches.作者: slipped-disk 時間: 2025-3-24 17:06
978-3-642-17649-4Springer Berlin Heidelberg 2010作者: 發(fā)酵劑 時間: 2025-3-24 21:20 作者: 圓錐體 時間: 2025-3-24 23:27 作者: Aphorism 時間: 2025-3-25 05:31 作者: flavonoids 時間: 2025-3-25 09:29
Christophe Clavier,Benoit Feix,Georges Gagnerot,Mylène Roussellet,Vincent Verneuil作者: 漂亮才會豪華 時間: 2025-3-25 13:25 作者: Atheroma 時間: 2025-3-25 18:25 作者: 中止 時間: 2025-3-25 22:24
Claudio Agostino Ardagna,Sabrina De Capitani di Vimercati,Sara Foresti,Gregory Neven,Stefano Parabosh a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know作者: 愛了嗎 時間: 2025-3-26 01:25 作者: Wernickes-area 時間: 2025-3-26 05:15
Jaydip Sen We also hope that a game-based proof is easier to (potentially formally) verify..We prove security of (a minor variation of) OCAKE, assuming the underlying KEM satisfies notions of ciphertext indistinguishability, anonymity, and (computational) public-key uniformity. Using multi-user variants of th作者: LURE 時間: 2025-3-26 11:25
Flavio Lombardi,Roberto Di Pietro construct a few 4-round truncated differentials with probability . of SPRING128, 5-round truncated differentials with probability . of SPRING128 and 11-round truncated differentials with probability . of SPRING256, and finally we make truncated differential attacks on 6-round SPRING128-128/256, 7-r作者: OTHER 時間: 2025-3-26 15:19 作者: Interdict 時間: 2025-3-26 17:54 作者: Paleontology 時間: 2025-3-26 22:25
Xuan Jiang,Wenhui Hu,Sencun Zhu,Guohong Cao We also hope that a game-based proof is easier to (potentially formally) verify..We prove security of (a minor variation of) OCAKE, assuming the underlying KEM satisfies notions of ciphertext indistinguishability, anonymity, and (computational) public-key uniformity. Using multi-user variants of th作者: 藥物 時間: 2025-3-27 01:30 作者: poliosis 時間: 2025-3-27 08:13
Billy Bob Brumley,Risto M. Hakala,Kaisa Nyberg,Sampo Soviokability notion of . and may fail to deliver promised security guarantees. In response to these challenges, our contribution aims to bridge the gap in practical and secure post-quantum . solutions. Our work introduces an isogeny-based adaptor signature utilizing the . signature scheme. We define a v作者: Dappled 時間: 2025-3-27 12:22
Basel Alomair,Radha Poovendran improvements of an order of magnitude in the offline phase for a single batch training. Finally, we apply our protocol to a real-world application for diagnostic prediction based on publicly available ECG heartbeat data. We achieve an improvement by a factor of two in the total throughput for both 作者: 不成比例 時間: 2025-3-27 15:11
Jiaxin Pan,Libin Wang,Changshe Map testing techniques, while existing BC-IBE schemes are constructed by using error-correcting codes or cover-free families. As a result, we can obtain post-quantum BC-IBE schemes with more compact public parameters by applying NIST-PQC PKE schemes to our generic construction.作者: 即席 時間: 2025-3-27 21:26
Alessandro Sorniotti,Refik Molva public keys and the sender to encrypt messages under these two public keys separately, or it requires the sender to encrypt messages using two different encryption ways under the same public key generated by the receiver. In contrast, our work only involves one pair of keys and one “packed” encrypt作者: Carcinogen 時間: 2025-3-27 23:02 作者: 沖擊力 時間: 2025-3-28 04:29
Ming Chen,Kaigui Wu,Jie Xu,Pan Heunique teaching models to foster humanizing global values: diversity and inclusion, ecohumanistic responsibility, and a dialogue between diverse stands and perspectives. It guides learners toward attaining their objectives by acquiring independent learning skills. Together, these teaching models are作者: HUMP 時間: 2025-3-28 08:45 作者: Nefarious 時間: 2025-3-28 14:17
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts set and some users in the authorized set, provided that the number of corrupted users in the authorized set is less than a threshold. We also propose an efficient tradeoff between the key size and the ciphertext size, which gives the first TPKE scheme with adaptive security and sublinear-size publi作者: cardiopulmonary 時間: 2025-3-28 15:01 作者: patriot 時間: 2025-3-28 19:34
CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization The contributions of this paper are twofold: first, to investigate the characteristics and security requirements of CUDA-enabled cloud computing nodes; and, second, to provide an architecture for leveraging CUDA hardware resources in a secure virtualization environment, to improve cloud security wi作者: 名義上 時間: 2025-3-29 01:05
SEIP: Simple and Efficient Integrity Protection for Open Mobile Platformsns while still achieves a high assurance of platform integrity. SEIP is deployed within a commercially available Linux-based smartphone and demonstrates that it can effectively prevent certain malware. The security policy of our implementation is less than 20kB, and a performance study shows that it作者: cacophony 時間: 2025-3-29 06:36
Compromise-Resilient Anti-jamming for Wireless Sensor Networkse network will generate a new group key to be shared only by all non-compromised nodes. After that, the insider jammer is revoked and will be unable to predict the future communication channels used by non-compromised nodes. We implement and evaluate our solution using the Mica2 Mote platform and sh作者: Chagrin 時間: 2025-3-29 09:37
Cryptographic Hash Functions: Theory and Practiceis invested in this topic was rather limited. From the hundred designs published before 2005, about 80% was cryptanalyzed; this includes widely used hash functions such as MD4 and MD5. Moreover, serious shortcomings have been identified in the theoretical foundations of existing designs. In response作者: Incommensurate 時間: 2025-3-29 12:22 作者: 說不出 時間: 2025-3-29 19:34
Fine-Grained Disclosure of Access Policies evaluation of (certified or uncertified) properties, that clients can present. Since assuming the client to know a-priori the properties she should present to acquire access is clearly limiting, servers should be able to respond to client requests with information on the access control policies reg作者: Euphonious 時間: 2025-3-29 19:49 作者: 防銹 時間: 2025-3-30 01:17 作者: ODIUM 時間: 2025-3-30 07:25
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts schemes suffer from either long ciphertexts with size linear in the number of authorized users or can only achieve non-adaptive security. A non-adaptive attacker is assumed to disclose her target attacking set of users even before the system parameters are published. The notion of non-adaptive secu作者: Ischemic-Stroke 時間: 2025-3-30 11:42
A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networksentralized nature of P2P network is exploited by malicious users who distribute unauthentic or harmful contents. Despite the existence of a number of trust management schemes for combating against free riding and distribution of malicious files, these mechanisms are not scalable due to their high co作者: Melatonin 時間: 2025-3-30 13:30
CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualizationuting capabilities of even commodity HW are boosting, in particular thanks to the adoption of *-core technologies. For instance, the Nvidia Compute Unified Device Architecture (CUDA) technology is increasingly available on a large part of commodity hardware. In this paper, we show that it is possibl作者: 良心 時間: 2025-3-30 18:47
SEIP: Simple and Efficient Integrity Protection for Open Mobile Platformshe disadvantages of applying traditional integrity models on these performance and user experience constrained devices. The major security objective of SEIP is to protect trusted services and resources (e.g., those belonging to cellular service providers and device manufacturers) from third party co作者: 終止 時間: 2025-3-30 20:53 作者: nascent 時間: 2025-3-31 01:04
Compromise-Resilient Anti-jamming for Wireless Sensor Networks. Thus, the communications among normal sensor nodes become difficult or even impossible. Although some research has been conducted on countering jamming attacks, few works considered jamming by insiders. Here, an attacker first compromises some legitimate sensor nodes to acquire the common cryptogr作者: HARP 時間: 2025-3-31 08:29
On Practical Second-Order Power Analysis Attacks for Block Ciphers reduced complexity, produce the same result as the original one, without requiring any additional tool. The validity of the proposed variant is confirmed by experiments, whose results allow for a comparison between the two approaches.作者: Substance-Abuse 時間: 2025-3-31 10:30 作者: Headstrong 時間: 2025-3-31 13:22 作者: 昆蟲 時間: 2025-3-31 19:11
Security Enhancement and Modular Treatment towards Authenticated Key Exchangeoid the controversial random oracle assumption in the security proof. Our model treats the AKE protocol as two relatively independent modules, the secret exchange module and the key derivation module, and formalizes the adversarial capabilities and security properties for each of these modules. We p作者: 躲債 時間: 2025-4-1 01:12
Federated Secret Handshakes with Support for Revocationssession of given properties, such as group membership. All the Secret Handshake schemes to date assume the existence of a single, centralized Certification Authority (CA). We challenge this assumption and create the first Secret Handshake scheme that can be managed by a federation of separate and m作者: 擁護 時間: 2025-4-1 05:56 作者: GLIDE 時間: 2025-4-1 08:43 作者: MINT 時間: 2025-4-1 12:49 作者: Ibd810 時間: 2025-4-1 18:09 作者: impale 時間: 2025-4-1 21:24