找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Security and Cryptology - ICISC 2001; 4th International Co Kwangjo Kim Conference proceedings 2002 Springer-Verlag Berlin Heide

[復制鏈接]
樓主: DEBUT
51#
發(fā)表于 2025-3-30 10:41:48 | 只看該作者
52#
發(fā)表于 2025-3-30 14:16:46 | 只看該作者
Decentralized Event Correlation for Intrusion Detection,ct such attacks therefore have to collect and correlate information from different sources. We propose a completely decentralized approach to solve the task of event correlation and information fusing of data gathered from multiple points within the network..Our system models an intrusion as a patte
53#
發(fā)表于 2025-3-30 18:54:07 | 只看該作者
Enhancing the Security of Cookies, in a user’s shopping cart to authentication information used for accessing restricted pages. While cookies are clearly very useful, they can also be abused. In this paper, security threats that cookies can pose to a user are identified, as are the security requirements necessary to defeat them. Var
54#
發(fā)表于 2025-3-31 00:46:44 | 只看該作者
A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation,ack systems and servers by hackers very frequently. Recently, many researches tried to prevent it, and several solutions were developed such as Libsafe and StackGuard; however, these solutions have a few problems. In this paper we present a new stack buffer overflow attack prevention technique that
55#
發(fā)表于 2025-3-31 02:05:12 | 只看該作者
56#
發(fā)表于 2025-3-31 06:46:48 | 只看該作者
Binary Codes for Collusion-Secure Fingerprinting,iderations, the pirates’ probablity of success (which must be non-zero, as was shown by Boneh and Shaw) on one hand, and decoding complexity on the other. We show how to minimize the pirates’ probability of success: but the associated decoding complexity is .(. .), where . is the number of users. Ne
57#
發(fā)表于 2025-3-31 12:50:04 | 只看該作者
Copyright Protection of Object-Oriented Software,rmarks on three “orthogonal” levels. For the first level, watermarks are injected into objects. The second level watermarking is used to select proper variants of the source code. The third level uses transition function that can be used to generate copies with different functionalities. Generic wat
58#
發(fā)表于 2025-3-31 16:14:46 | 只看該作者
59#
發(fā)表于 2025-3-31 21:02:05 | 只看該作者
Slide Attacks with a Known-Plaintext Cryptanalysis,yzing on the other part, the key scheduling part, are known. A slide attack is an instance of attacks exploiting the key schedule weakness. In this paper, currently proposed slide attacks can be still enhanced so that all currently published known-plaintext analytic technique can be applied to small
60#
發(fā)表于 2025-3-31 23:49:03 | 只看該作者
Constructions of Cheating Immune Secret Sharing,submit invalid shares to the combiner. In the second one, the cheaters collectively decide which shares are to be modified so the combiner gets a mixture of valid and invalid shares from the cheaters. The secret scheme is said to be .-cheating immune if any group of . cheaters has no advantage over
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-2-7 05:56
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復 返回頂部 返回列表
武鸣县| 厦门市| 留坝县| 石河子市| 壤塘县| 南川市| 海丰县| 金坛市| 金乡县| 东阳市| 海晏县| 邹平县| 孝义市| 紫金县| 九龙城区| 浦县| 文化| 卢湾区| 怀安县| 龙泉市| 望城县| 育儿| 天气| 行唐县| 兰考县| 嘉义市| 昌平区| 祁门县| 漯河市| 六盘水市| 龙南县| 汝阳县| 文登市| 罗江县| 天津市| 鄂温| 观塘区| 东城区| 云林县| 搜索| 陕西省|