找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information and Communications Security; 16th International C Lucas C. K. Hui,S. H. Qing,S. M. Yiu Conference proceedings 2015 Springer Int

[復(fù)制鏈接]
樓主: Agoraphobia
41#
發(fā)表于 2025-3-28 17:59:52 | 只看該作者
Privacy-Preserving Distance-Bounding Proof-of-Knowledge,ave numerous applications including authentication and proximity checking. The privacy problem in .?protocols was limited to privacy against . adversaries. Gambs . [.] extended this limitation and proposed a protocol that provides . privacy when the verifier is malicious, or . registration authority
42#
發(fā)表于 2025-3-28 22:17:09 | 只看該作者
Distance Lower Bounding,applications in secure authentication and location based services. We consider the dual problem of distance lower bounding (DLB), where the prover proves it is outside a distance bound to the verifier. We motivate this problem through a number of application scenarios, and model security against dis
43#
發(fā)表于 2025-3-29 02:59:04 | 只看該作者
Efficient Adaptive Oblivious Transfer Without ,-type Assumptions in UC Framework,arty computation protocols, the efficiency and security are two big issues in its design. In this paper, we present an efficient, . (UC) secure adaptive oblivious transfer without .-.. The proposed protocol is UC secure under Decision Linear (DLIN), Decision Bilinear Diffie-Hellman (DBDH) and Square
44#
發(fā)表于 2025-3-29 06:15:37 | 只看該作者
45#
發(fā)表于 2025-3-29 07:42:22 | 只看該作者
46#
發(fā)表于 2025-3-29 11:30:53 | 只看該作者
47#
發(fā)表于 2025-3-29 19:20:22 | 只看該作者
Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR Processors,ms to fit resource-limited embedded systems. In this paper, we describe optimization techniques to speed up multi-precision multiplication and squaring on the AVR ATmega series of 8-bit microcontrollers. First, we present a new approach to perform multi-precision multiplication, called ., that resem
48#
發(fā)表于 2025-3-29 21:25:09 | 只看該作者
New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security,ructions of IBE schemes, the one proposed by Boneh and Boyen (in Eurocrypt 2004) is quite important from both practical and theoretical points of view. The scheme was standardized as IEEE P1363.3 and is the basis for many subsequent constructions. In this paper, we investigate its multi-challenge se
49#
發(fā)表于 2025-3-30 03:07:26 | 只看該作者
Method for Determining Whether or not Text Information Is Leaked from Computer Display Through Elecains text information, this paper proposed an evaluation method without reconstructing the displayed image. In this method, sparse decomposition in wavelet is used to describe the characteristics of electromagnetic radiation signals contain text information. By using this method, it is easy to detec
50#
發(fā)表于 2025-3-30 07:16:01 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-18 15:16
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
庆阳市| 交口县| 兴山县| 政和县| 延津县| 黎川县| 怀化市| 武陟县| 东阿县| 壶关县| 铁力市| 开化县| 深水埗区| 富平县| 宜君县| 红安县| 韶山市| 宜州市| 长海县| 石嘴山市| 边坝县| 梨树县| 五莲县| 湟中县| 石台县| 云阳县| 玛纳斯县| 天峨县| 南宁市| 灌阳县| 库车县| 北宁市| 西平县| 防城港市| 墨竹工卡县| 昌平区| 新余市| 南澳县| 邹平县| 偏关县| 武平县|