找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪(fǎng)問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Information and Communications Security; 17th International C Sihan Qing,Eiji Okamoto,Dongmei Liu Conference proceedings 2016 Springer Inte

[復(fù)制鏈接]
樓主: exterminate
31#
發(fā)表于 2025-3-27 00:00:14 | 只看該作者
Minimizing Databases Attack Surface Against SQL Injection Attacks,ploit, to gain access to this data, SQL injections are considered one of the most serious vulnerabilities, which remain at the top twenty most known vulnerabilities more than a decade. Though various defenses have been proposed against SQL injections for database protection, most of them require “mo
32#
發(fā)表于 2025-3-27 04:10:01 | 只看該作者
33#
發(fā)表于 2025-3-27 07:23:00 | 只看該作者
34#
發(fā)表于 2025-3-27 13:04:59 | 只看該作者
On Promise Problem of the Generalized Shortest Vector Problem,problem associated with estimating the subspace avoiding minimum. We show . lies in ., where . is a constant. Furthermore, we study relationships between . of a lattice and the .th successive minimum, the shortest basis, and the shortest vector in the dual of the saturated sublattice, and obtain new
35#
發(fā)表于 2025-3-27 16:44:35 | 只看該作者
,Secret Key Extraction with Quantization Randomness Using Hadamard Matrix on?QuaDRiGa Channel,iation and privacy amplification. Despite the tremendous researches of quantization and information reconciliation techniques, there is little consideration about the risk of information reconstruction by the unauthorized node due to the high correlation of subsequent quantization bits, which is una
36#
發(fā)表于 2025-3-27 20:02:45 | 只看該作者
Practical Lattice-Based Fault Attack and Countermeasure on SM2 Signature Algorithm,ce attack presented in SAC’2013 and fault attack against SM2 in practice. We successfully utilize the laser fault attack to skip the instructions of nonces being written into RAM, so that the nonces in signatures share partial same bits from each other. Next, we build the model of lattice attack and
37#
發(fā)表于 2025-3-27 22:22:35 | 只看該作者
38#
發(fā)表于 2025-3-28 02:56:17 | 只看該作者
How to Vote Privately Using Bitcoin,enough to setup digital contracts whose fund transfer can be enforced automatically..In this paper, we design protocols for the bitcoin voting problem, in which there are . voters, each of which wishes to fund exactly one of two candidates . and .. The winning candidate is determined by majority vot
39#
發(fā)表于 2025-3-28 09:39:44 | 只看該作者
Multidimensional Zero-Correlation Linear Cryptanalysis on 23-Round LBlock-s,he same as LBlock except that the former adopts an improved key schedule algorithm with better diffusion property. Using the shifting relation of certain subkeys derived by the new key schedule algorithm, we present a multidimensional zero-correlation linear cryptanalysis on 23-round LBlock-s. The t
40#
發(fā)表于 2025-3-28 12:33:32 | 只看該作者
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-Resistant Blackbox Traceabsatisfying the policies are generally . by multiple users. If a malicious user, with his attributes shared with multiple other users, created a decryption blackbox for sale, this malicious user could be difficult to identify from the blackbox. Hence in practice, a useful CP-ABE scheme should have so
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-2-1 03:51
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
澳门| 晋江市| 商河县| 白沙| 黔西| 瓦房店市| 长垣县| 天峻县| 昂仁县| 大兴区| 秀山| 定结县| 六枝特区| 日土县| 青海省| 治多县| 兴化市| 焉耆| 兴城市| 城步| 赫章县| 新野县| 大庆市| 合作市| 文山县| 上饶县| 高清| 琼海市| 锡林浩特市| 香河县| 当涂县| 色达县| 金昌市| 且末县| 济阳县| 江永县| 吴桥县| 太谷县| 潮安县| 若羌县| 敦化市|