找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information and Communications Security; 12th International C Miguel Soriano,Sihan Qing,Javier López Conference proceedings 2010 Springer B

[復(fù)制鏈接]
樓主: Thoracic
41#
發(fā)表于 2025-3-28 15:01:50 | 只看該作者
42#
發(fā)表于 2025-3-28 19:34:26 | 只看該作者
CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization The contributions of this paper are twofold: first, to investigate the characteristics and security requirements of CUDA-enabled cloud computing nodes; and, second, to provide an architecture for leveraging CUDA hardware resources in a secure virtualization environment, to improve cloud security wi
43#
發(fā)表于 2025-3-29 01:05:27 | 只看該作者
SEIP: Simple and Efficient Integrity Protection for Open Mobile Platformsns while still achieves a high assurance of platform integrity. SEIP is deployed within a commercially available Linux-based smartphone and demonstrates that it can effectively prevent certain malware. The security policy of our implementation is less than 20kB, and a performance study shows that it
44#
發(fā)表于 2025-3-29 06:36:00 | 只看該作者
Compromise-Resilient Anti-jamming for Wireless Sensor Networkse network will generate a new group key to be shared only by all non-compromised nodes. After that, the insider jammer is revoked and will be unable to predict the future communication channels used by non-compromised nodes. We implement and evaluate our solution using the Mica2 Mote platform and sh
45#
發(fā)表于 2025-3-29 09:37:17 | 只看該作者
Cryptographic Hash Functions: Theory and Practiceis invested in this topic was rather limited. From the hundred designs published before 2005, about 80% was cryptanalyzed; this includes widely used hash functions such as MD4 and MD5. Moreover, serious shortcomings have been identified in the theoretical foundations of existing designs. In response
46#
發(fā)表于 2025-3-29 12:22:13 | 只看該作者
47#
發(fā)表于 2025-3-29 19:34:51 | 只看該作者
Fine-Grained Disclosure of Access Policies evaluation of (certified or uncertified) properties, that clients can present. Since assuming the client to know a-priori the properties she should present to acquire access is clearly limiting, servers should be able to respond to client requests with information on the access control policies reg
48#
發(fā)表于 2025-3-29 19:49:58 | 只看該作者
49#
發(fā)表于 2025-3-30 01:17:21 | 只看該作者
50#
發(fā)表于 2025-3-30 07:25:57 | 只看該作者
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts schemes suffer from either long ciphertexts with size linear in the number of authorized users or can only achieve non-adaptive security. A non-adaptive attacker is assumed to disclose her target attacking set of users even before the system parameters are published. The notion of non-adaptive secu
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-25 17:42
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
巴林右旗| 确山县| 如皋市| 乡宁县| 腾冲县| 福建省| 肥乡县| 囊谦县| 扎兰屯市| 黄冈市| 弋阳县| 朔州市| 武川县| 抚远县| 资溪县| 平湖市| 夏邑县| 青州市| 甘谷县| 玉树县| 奈曼旗| 普格县| 伊宁县| 博客| 麻城市| 乌审旗| 神农架林区| 永丰县| 益阳市| 雅江县| 定州市| 田林县| 丽水市| 丹棱县| 类乌齐县| 潢川县| 靖边县| 正安县| 巴青县| 海林市| 肥东县|