找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Computer Security - ESORICS 2010; 15th European Sympos Dimitris Gritzalis,Bart Preneel,Marianthi Theohari Conference proceedings 2010 Sprin

[復制鏈接]
樓主: 變成小松鼠
21#
發(fā)表于 2025-3-25 05:24:58 | 只看該作者
22#
發(fā)表于 2025-3-25 09:37:59 | 只看該作者
23#
發(fā)表于 2025-3-25 12:50:26 | 只看該作者
Privacy-Preserving, Taxable Bank Accountsanism (which can be extended to a progressive one) and using unlinkable credentials, digital cash, and zero knowledge proofs of knowledge, we present a solution that prevents anyone, even the tax authority, from knowing which accounts belong to which users, or from being able to link any account to another or to purchases or deposits.
24#
發(fā)表于 2025-3-25 19:32:24 | 只看該作者
Formal Analysis of Privacy for Vehicular Mix-Zonesprivacy for such a zone. We give a set of necessary conditions for any mix-zone protocol to preserve privacy. We analyse, using the tool ProVerif, a particular proposal for key distribution in mix-zones, the CMIX protocol. We show that in many scenarios it does not preserve privacy, and we propose a fix.
25#
發(fā)表于 2025-3-25 20:37:27 | 只看該作者
A New Framework for RFID Privacyional framework for RFID privacy in a rigorous and precise manner. Our framework is based on a zero-knowledge (ZK) formulation [8,6] and incorporates the notions of adaptive completeness and mutual authentication. We provide meticulous justification of the new framework and contrast it with existing
26#
發(fā)表于 2025-3-26 01:54:52 | 只看該作者
Readers Behaving Badlytification cards and payment instruments. In this context, public key certificates form the cornerstone of the overall system security. In this paper, we argue that one of the prominent challenges is how to handle revocation and expiration checking of RFID reader certificates. This is an important i
27#
發(fā)表于 2025-3-26 05:34:28 | 只看該作者
28#
發(fā)表于 2025-3-26 11:37:04 | 只看該作者
29#
發(fā)表于 2025-3-26 13:21:32 | 只看該作者
30#
發(fā)表于 2025-3-26 19:12:30 | 只看該作者
A Theory of Runtime Enforcement, with Results security-relevant actions and their results. Because previous work could not model monitors transforming results, MRAs capture realistic behaviors outside the scope of previous models. MRAs also have a simple but realistic operational semantics that makes it straightforward to define concrete MRAs.
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-8 17:50
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
株洲县| 岳池县| 沈丘县| 双峰县| 鹤岗市| 宿迁市| 隆子县| 斗六市| 崇左市| 中江县| 华亭县| 鹿邑县| 鹤庆县| 越西县| 梅河口市| 习水县| 青阳县| 泸水县| 西乌| 芦溪县| 黎平县| 留坝县| 澄江县| 蒙阴县| 新闻| 仁怀市| 拜城县| 溧水县| 龙泉市| 日喀则市| 永靖县| 娄烦县| 盖州市| 罗田县| 健康| 抚宁县| 霍林郭勒市| 杭州市| 定陶县| 商洛市| 四会市|