找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Computer Security - ESORICS 2010; 15th European Sympos Dimitris Gritzalis,Bart Preneel,Marianthi Theohari Conference proceedings 2010 Sprin

[復(fù)制鏈接]
樓主: 變成小松鼠
11#
發(fā)表于 2025-3-23 09:44:01 | 只看該作者
Flexible Scheduler-Independent Securityopment of a novel scheduler-independent information flow property was the identification of a suitable class of schedulers that covers the most relevant schedulers. The contributions of this article include a novel security property, a scheduler independence result, and a provably sound program analysis.
12#
發(fā)表于 2025-3-23 14:27:19 | 只看該作者
Secure Multiparty Linear Programming Using Fixed-Point Arithmetic a variant of the simplex algorithm and secure computation with fixed-point rational numbers, optimized for this type of application. We present the main protocols as well as performance measurements for an implementation of our solution.
13#
發(fā)表于 2025-3-23 19:08:29 | 只看該作者
14#
發(fā)表于 2025-3-24 01:08:35 | 只看該作者
Sequential Protocol Composition in Maude-NPAation, we are able to analyze and verify this dynamic composition in the current Maude-NPA tool. We prove soundness and completeness of the protocol transformation with respect to the extended operational semantics, and illustrate our results on some examples.
15#
發(fā)表于 2025-3-24 05:32:58 | 只看該作者
https://doi.org/10.1007/978-94-011-0229-2anism (which can be extended to a progressive one) and using unlinkable credentials, digital cash, and zero knowledge proofs of knowledge, we present a solution that prevents anyone, even the tax authority, from knowing which accounts belong to which users, or from being able to link any account to another or to purchases or deposits.
16#
發(fā)表于 2025-3-24 07:29:39 | 只看該作者
The Clinical Applications of SPETprivacy for such a zone. We give a set of necessary conditions for any mix-zone protocol to preserve privacy. We analyse, using the tool ProVerif, a particular proposal for key distribution in mix-zones, the CMIX protocol. We show that in many scenarios it does not preserve privacy, and we propose a fix.
17#
發(fā)表于 2025-3-24 11:11:59 | 只看該作者
The Clinical Applications of SPETorks. Finally, based on the protocol of [20], we propose an efficient RFID mutual authentication protocol and analyze its security and privacy. The methodology used in our analysis can also be applied to analyze other RFID protocols within the new framework.
18#
發(fā)表于 2025-3-24 16:18:21 | 只看該作者
19#
發(fā)表于 2025-3-24 22:05:14 | 只看該作者
0302-9743 has a tradition that goes back two decades. It tries to bring together the international research community in a top-quality event that covers all the areas of computer security, ranging from theory to applications. ESORICS 2010 was the 15th edition of the event. It was held in Athens, Greece, Septe
20#
發(fā)表于 2025-3-25 02:56:29 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-9 05:21
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
青冈县| 镶黄旗| 方山县| 林甸县| 太仆寺旗| 通渭县| 云林县| 佛学| 依兰县| 武清区| 松潘县| 延吉市| 普兰县| 清丰县| 微博| 嘉祥县| 尚义县| 谢通门县| 阳信县| 安远县| 包头市| 阳西县| 大洼县| 双牌县| 客服| 海宁市| 定结县| 哈尔滨市| 文昌市| 乌鲁木齐县| 麦盖提县| 红原县| 乃东县| 丰台区| 曲阳县| 松潘县| 庄浪县| 徐汇区| 稷山县| 宁国市| 黄石市|