找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information and Communications Security; 12th International C Miguel Soriano,Sihan Qing,Javier López Conference proceedings 2010 Springer B

[復(fù)制鏈接]
樓主: Thoracic
41#
發(fā)表于 2025-3-28 15:01:50 | 只看該作者
42#
發(fā)表于 2025-3-28 19:34:26 | 只看該作者
CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization The contributions of this paper are twofold: first, to investigate the characteristics and security requirements of CUDA-enabled cloud computing nodes; and, second, to provide an architecture for leveraging CUDA hardware resources in a secure virtualization environment, to improve cloud security wi
43#
發(fā)表于 2025-3-29 01:05:27 | 只看該作者
SEIP: Simple and Efficient Integrity Protection for Open Mobile Platformsns while still achieves a high assurance of platform integrity. SEIP is deployed within a commercially available Linux-based smartphone and demonstrates that it can effectively prevent certain malware. The security policy of our implementation is less than 20kB, and a performance study shows that it
44#
發(fā)表于 2025-3-29 06:36:00 | 只看該作者
Compromise-Resilient Anti-jamming for Wireless Sensor Networkse network will generate a new group key to be shared only by all non-compromised nodes. After that, the insider jammer is revoked and will be unable to predict the future communication channels used by non-compromised nodes. We implement and evaluate our solution using the Mica2 Mote platform and sh
45#
發(fā)表于 2025-3-29 09:37:17 | 只看該作者
Cryptographic Hash Functions: Theory and Practiceis invested in this topic was rather limited. From the hundred designs published before 2005, about 80% was cryptanalyzed; this includes widely used hash functions such as MD4 and MD5. Moreover, serious shortcomings have been identified in the theoretical foundations of existing designs. In response
46#
發(fā)表于 2025-3-29 12:22:13 | 只看該作者
47#
發(fā)表于 2025-3-29 19:34:51 | 只看該作者
Fine-Grained Disclosure of Access Policies evaluation of (certified or uncertified) properties, that clients can present. Since assuming the client to know a-priori the properties she should present to acquire access is clearly limiting, servers should be able to respond to client requests with information on the access control policies reg
48#
發(fā)表于 2025-3-29 19:49:58 | 只看該作者
49#
發(fā)表于 2025-3-30 01:17:21 | 只看該作者
50#
發(fā)表于 2025-3-30 07:25:57 | 只看該作者
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts schemes suffer from either long ciphertexts with size linear in the number of authorized users or can only achieve non-adaptive security. A non-adaptive attacker is assumed to disclose her target attacking set of users even before the system parameters are published. The notion of non-adaptive secu
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-25 10:40
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
黎城县| 峡江县| 松阳县| 德钦县| 台南县| 施甸县| 富民县| 高平市| 溆浦县| 成安县| 西峡县| 武乡县| 香河县| 化州市| 堆龙德庆县| 登封市| 兴城市| 娱乐| 彭阳县| 镇坪县| 承德市| 云龙县| 永丰县| 海伦市| 长春市| 治多县| 海丰县| 定襄县| 汉源县| 阿尔山市| 漳州市| 六枝特区| 广昌县| 阿鲁科尔沁旗| 泉州市| 获嘉县| 乳源| 通辽市| 米脂县| 伊金霍洛旗| 梧州市|