找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Communications and Multimedia Security; 8th IFIP TC-6 TC-11 David Chadwick,Bart Preneel Conference proceedings 20051st edition IFIP Intern

[復(fù)制鏈接]
樓主: Corrugate
41#
發(fā)表于 2025-3-28 15:03:10 | 只看該作者
Threat Modelling for Active Directoryased on the STRIDE classification methodology. The paper also provides outline descriptions of countermeasures that can be deployed to protect against the different threats and vulnerabilities identified here.
42#
發(fā)表于 2025-3-28 22:40:18 | 只看該作者
43#
發(fā)表于 2025-3-29 01:34:48 | 只看該作者
Analysis of the DVB Common Scrambling Algorithma stream and a block cipher, apparently for a larger security margin. In this paper we set out to analyze the block cipher and the stream cipher separately and give an overview of how they interact with each other. We present a practical attack on the stream cipher. Research on the block cipher so f
44#
發(fā)表于 2025-3-29 06:23:35 | 只看該作者
An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intrudery used in other types of protocols (for example, in authentication protocols). These message constructors include blind signatures, commitments and zero-knowledge proofs. Furthermore, a standard formalization of the Dolev-Yao intruder [6] does not take into account these message constructors, nor do
45#
發(fā)表于 2025-3-29 08:52:35 | 只看該作者
Robust Visual Hashing Using JPEG 2000obust visual feature extraction. We propose to use the wavelet-based JPEG2000 image compression algorithm for feature extraction. We discuss the sensitivity of our proposed method against different malicious data modifications including local image alterations and Stirmark attacks.
46#
發(fā)表于 2025-3-29 15:00:53 | 只看該作者
47#
發(fā)表于 2025-3-29 17:25:48 | 只看該作者
48#
發(fā)表于 2025-3-29 22:57:23 | 只看該作者
Communications and Multimedia Security978-0-387-24486-0Series ISSN 1868-4238 Series E-ISSN 1868-422X
49#
發(fā)表于 2025-3-30 00:17:29 | 只看該作者
50#
發(fā)表于 2025-3-30 06:36:04 | 只看該作者
Soil Dynamics and Foundation Modelingon environments. The approach used is based on the STRIDE classification methodology. The results presented provide also some general guidelines and countermeasures against the different attacks that can exploit the identified vulnerabilities.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-7 10:39
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
延津县| 乐都县| 垣曲县| 万源市| 乌恰县| 林甸县| 怀柔区| 台江县| 凤阳县| 介休市| 托里县| 榆林市| 莫力| 海盐县| 长子县| 遂宁市| 屏南县| 义乌市| 天镇县| 年辖:市辖区| 定日县| 涟源市| 额敏县| 垦利县| 华池县| 泰兴市| 来凤县| 西和县| 寻甸| 门头沟区| 汝南县| 彭水| 饶河县| 宝丰县| 延长县| 印江| 伊宁县| 达尔| 海淀区| 吴江市| 商城县|