找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Computer Security -- ESORICS 2009; 14th European Sympos Michael Backes,Peng Ning Conference proceedings 2009 Springer-Verlag Berlin Heidelb

[復制鏈接]
樓主: 尖酸好
11#
發(fā)表于 2025-3-23 12:15:41 | 只看該作者
https://doi.org/10.1007/978-981-10-7632-9t regulations (e.g., the Sarbanes-Oxley act and the Securities and Exchange Commission rule) mandate secure retention of important business records for several years. We provide a mechanism to authenticate bulk repositories of archived documents. In our approach, a space efficient local data structu
12#
發(fā)表于 2025-3-23 17:54:41 | 只看該作者
Homocysteine in Occlusive Vascular Diseaseous methods are all limited in analyzing only plain-text communications wherein the exchanged messages are not encrypted. In this paper, we propose ReFormat, a system that aims at deriving the message format even when the message is encrypted. Our approach is based on the observation that an encrypt
13#
發(fā)表于 2025-3-23 19:50:58 | 只看該作者
14#
發(fā)表于 2025-3-24 01:32:19 | 只看該作者
15#
發(fā)表于 2025-3-24 02:48:11 | 只看該作者
16#
發(fā)表于 2025-3-24 06:53:48 | 只看該作者
User-Centric Handling of Identity Agent Compromisefor users. We believe that an identity management system (IdMS) that empowers users to become aware of how and when their identity credentials are used is critical for the success of such online services. Furthermore, rapid revocation and recovery of potentially compromised credentials is desirable.
17#
發(fā)表于 2025-3-24 14:00:59 | 只看該作者
The Coremelt Attackt the victim host against undesired traffic..We present Coremelt, a new attack mechanism, where attackers only send traffic between each other, and not towards a victim host. As a result, none of the attack traffic is unwanted. The Coremelt attack is powerful because among . attackers, there are .(.
18#
發(fā)表于 2025-3-24 17:16:30 | 只看該作者
Lightweight Opportunistic Tunneling (LOT)ld automatically and securely establish efficient tunnel, encapsulating packets sent between them. This allows . to discard packets which use .’s network addresses but were not sent via . (i.e. are spoofed) and vice verse..LOT is practical: it is easy to manage (‘plug and play’, no coordination betw
19#
發(fā)表于 2025-3-24 21:18:10 | 只看該作者
Hide and Seek in Time — Robust Covert Timing Channelsrk communication. Previous results used encoding mechanisms that are either easy to detect with statistical analysis, thus spoiling the purpose of a covert channel, and/or are highly sensitive to channel noise, rendering them useless in practice. In this paper, we introduce a novel covert timing cha
20#
發(fā)表于 2025-3-25 02:53:21 | 只看該作者
 關于派博傳思  派博傳思旗下網站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網 吾愛論文網 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經驗總結 SCIENCEGARD IMPACTFACTOR 派博系數 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網安備110108008328) GMT+8, 2025-10-7 11:18
Copyright © 2001-2015 派博傳思   京公網安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
简阳市| 达孜县| 上犹县| 垦利县| 黎平县| 隆化县| 澎湖县| 临桂县| 古蔺县| 福州市| 郯城县| 乌鲁木齐县| 揭阳市| 公主岭市| 富川| 商城县| 乾安县| 宾阳县| 莒南县| 武汉市| 珠海市| 唐山市| 邵东县| 博乐市| 兰西县| 建阳市| 容城县| 扎赉特旗| 北海市| 绥中县| 贵溪市| 武鸣县| 南岸区| 龙口市| 浦江县| 尉氏县| 田阳县| 电白县| 淮滨县| 林西县| 右玉县|