找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information and Communications Security; 16th International C Lucas C. K. Hui,S. H. Qing,S. M. Yiu Conference proceedings 2015 Springer Int

[復(fù)制鏈接]
樓主: Agoraphobia
41#
發(fā)表于 2025-3-28 17:59:52 | 只看該作者
Privacy-Preserving Distance-Bounding Proof-of-Knowledge,ave numerous applications including authentication and proximity checking. The privacy problem in .?protocols was limited to privacy against . adversaries. Gambs . [.] extended this limitation and proposed a protocol that provides . privacy when the verifier is malicious, or . registration authority
42#
發(fā)表于 2025-3-28 22:17:09 | 只看該作者
Distance Lower Bounding,applications in secure authentication and location based services. We consider the dual problem of distance lower bounding (DLB), where the prover proves it is outside a distance bound to the verifier. We motivate this problem through a number of application scenarios, and model security against dis
43#
發(fā)表于 2025-3-29 02:59:04 | 只看該作者
Efficient Adaptive Oblivious Transfer Without ,-type Assumptions in UC Framework,arty computation protocols, the efficiency and security are two big issues in its design. In this paper, we present an efficient, . (UC) secure adaptive oblivious transfer without .-.. The proposed protocol is UC secure under Decision Linear (DLIN), Decision Bilinear Diffie-Hellman (DBDH) and Square
44#
發(fā)表于 2025-3-29 06:15:37 | 只看該作者
45#
發(fā)表于 2025-3-29 07:42:22 | 只看該作者
46#
發(fā)表于 2025-3-29 11:30:53 | 只看該作者
47#
發(fā)表于 2025-3-29 19:20:22 | 只看該作者
Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR Processors,ms to fit resource-limited embedded systems. In this paper, we describe optimization techniques to speed up multi-precision multiplication and squaring on the AVR ATmega series of 8-bit microcontrollers. First, we present a new approach to perform multi-precision multiplication, called ., that resem
48#
發(fā)表于 2025-3-29 21:25:09 | 只看該作者
New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security,ructions of IBE schemes, the one proposed by Boneh and Boyen (in Eurocrypt 2004) is quite important from both practical and theoretical points of view. The scheme was standardized as IEEE P1363.3 and is the basis for many subsequent constructions. In this paper, we investigate its multi-challenge se
49#
發(fā)表于 2025-3-30 03:07:26 | 只看該作者
Method for Determining Whether or not Text Information Is Leaked from Computer Display Through Elecains text information, this paper proposed an evaluation method without reconstructing the displayed image. In this method, sparse decomposition in wavelet is used to describe the characteristics of electromagnetic radiation signals contain text information. By using this method, it is easy to detec
50#
發(fā)表于 2025-3-30 07:16:01 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-18 22:39
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
山西省| 娄底市| 富阳市| 克拉玛依市| 湟源县| 综艺| 黄浦区| 扎兰屯市| 乌拉特前旗| 海原县| 二手房| 双鸭山市| 栾城县| 贞丰县| 德阳市| 普兰店市| 巨鹿县| 宾阳县| 永和县| 东兴市| 贡山| 龙海市| 库尔勒市| 会东县| 湘西| 鹤壁市| 简阳市| 达拉特旗| 怀宁县| 丽江市| 海丰县| 开阳县| 屯留县| 于都县| 广南县| 邛崃市| 黔东| 托克逊县| 旺苍县| 辽中县| 萨嘎县|