找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Information and Communications Security; 8th International Co Peng Ning,Sihan Qing,Ninghui Li Conference proceedings 2006 Springer-Verlag B

[復(fù)制鏈接]
樓主: Clique
21#
發(fā)表于 2025-3-25 10:48:57 | 只看該作者
A Security Analysis of the Precise Time Protocol (Short Paper)o (a) incorrectly resynchronize clocks, (b) rearrange or disrupt the hierarchy of PTP clocks, (c) bring the protocol participants into an inconsistent state, or (d) deprive victim slave clocks from synchronization in ways undetectable by generic network intrusion detection systems. We also propose c
22#
發(fā)表于 2025-3-25 14:23:57 | 只看該作者
An Identity-Based Proxy Signature Scheme from Pairingslf of the original signer. In this paper we propose an ID-based proxy signature scheme from bilinear pairings. We provide exact security proof of the proposed ID-based proxy signature scheme in the random oracle model under the Computational Diffie-Hellman assumption without using Forking Lemma.
23#
發(fā)表于 2025-3-25 19:47:19 | 只看該作者
24#
發(fā)表于 2025-3-25 21:01:12 | 只看該作者
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper)any schemes proposed, but most of them have already been found flawed due to the lack of formal security analysis. On the cryptanalysis of this type of schemes, in this paper, we further review two recently proposed schemes and show that their security claims are invalid. To address the current issu
25#
發(fā)表于 2025-3-26 01:44:35 | 只看該作者
Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Sizeproposed method to this scheme, the ciphertext size is reduced from . to .(.+log(./.)) without a substantial increase in the decryption-key size, where .,. denote the maximum number of colluders in a coalition and the total number of receivers respectively. The resulting scheme also supports black-b
26#
發(fā)表于 2025-3-26 07:40:57 | 只看該作者
27#
發(fā)表于 2025-3-26 11:24:23 | 只看該作者
A Construction for General and Efficient Oblivious Commitment Based Envelope Protocolsation about the attributes. Previous OCBE protocols are designed by taking zero-knowledge proof protocols that prove a committed value satisfies some property and changing the protocols so that instead of one party proving to the other party, the two parties compute two keys that agree if and only i
28#
發(fā)表于 2025-3-26 15:39:22 | 只看該作者
29#
發(fā)表于 2025-3-26 17:16:19 | 只看該作者
30#
發(fā)表于 2025-3-27 00:54:39 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-27 09:36
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
巴彦淖尔市| 呼图壁县| 渝中区| 三台县| 凌源市| 武山县| 吐鲁番市| 太白县| 泰宁县| 朔州市| 随州市| 龙胜| 芦溪县| 葵青区| 太谷县| 施甸县| 沁源县| 平原县| 泾阳县| 社会| 扶余县| 乐业县| 司法| 桐庐县| 长乐市| 剑阁县| 白河县| 巴林左旗| 洛宁县| 驻马店市| 昭平县| 穆棱市| 绥滨县| 托克托县| 沙田区| 四川省| 开平市| 昌邑市| 长宁县| 商水县| 建宁县|