找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Security and Privacy; 9th Australasian Con Huaxiong Wang,Josef Pieprzyk,Vijay Varadharajan Conference proceedings 2004 Springer

[復制鏈接]
樓主: nourish
31#
發(fā)表于 2025-3-26 23:26:36 | 只看該作者
Multi-service Oriented Broadcast Encryptiona threshold, a rekeying algorithm is proposed to update the user’s service memberships .. We formalize and prove the framework is dynamically secure under the random oracle model. We realize our framework with a scheme based on complete subtree method.
32#
發(fā)表于 2025-3-27 03:36:21 | 只看該作者
NGSCB: A Trusted Open Systemol and network authentication in mass market systems by authenticating executable code at all system layers. We have implemented a prototype of the system and expect the full system to be mass deployed.
33#
發(fā)表于 2025-3-27 07:27:34 | 只看該作者
Analysis of a Conference Scheme Under Active and Passive Attackss in the way that a colluding group of attackers can still obtain the conference key even after they all leave the conference. The passive attack does not need any attacker to ever participate in the conference. The conference key can be compromised with a large probability as long as the number of conferees is large.
34#
發(fā)表于 2025-3-27 12:36:05 | 只看該作者
35#
發(fā)表于 2025-3-27 16:20:39 | 只看該作者
Multi-service Oriented Broadcast Encryptionhis paper, we suggest a framework called . framework from the subset cover method [12] using RSA exponentiation technique. In this framework, each user’s secret storage is independent of the number of services. Service subscriptions and service providing can be efficiently processed. The service uns
36#
發(fā)表于 2025-3-27 19:26:20 | 只看該作者
37#
發(fā)表于 2025-3-28 00:32:10 | 只看該作者
Linear Code Implies Public-Key Traitor Tracing with ,urosawa–Desmedt scheme, can be derived from an [.,.,.]-linear code such that . ≥ 2.+1. In this paper, we show that the linear-coded Kurosawa–Desmedt scheme can be modified to allow revocation of users, that is to show a revocation scheme can be derived from a linear code. The overhead of the modifie
38#
發(fā)表于 2025-3-28 04:39:39 | 只看該作者
39#
發(fā)表于 2025-3-28 07:43:27 | 只看該作者
Single Database Private Information Retrieval with Logarithmic Communicationty and a solution with only logarithmic user-side communication complexity. Previously the best result could only achieve polylogarithmic communication on each side, and was based on certain less well-studied assumptions in number theory [6]. On the contrary, our schemes are based on Paillier’s cryp
40#
發(fā)表于 2025-3-28 11:49:13 | 只看該作者
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructionson the size of the predistributed data, as well as the size of the communications in any (one-round) protocol. We then show that these bounds are tight by exhibiting a scheme for oblivious polynomial evaluation achieveing all the lower bounds simultaneously. We also present a natural generalisation
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-25 07:21
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復 返回頂部 返回列表
越西县| 宿迁市| 武陟县| 枣强县| 报价| 剑阁县| 全州县| 凤翔县| 青铜峡市| 巴林右旗| 札达县| 中山市| 满洲里市| 耒阳市| 达孜县| 乳山市| 平顺县| 龙川县| 武山县| 康定县| 神池县| 凤山市| 长宁区| 慈利县| 奎屯市| 武强县| 黑龙江省| 马龙县| 太白县| 海宁市| 平南县| 巫溪县| 邢台市| 额济纳旗| 通许县| 新蔡县| 彭州市| 灌阳县| 吴川市| 开阳县| 萨迦县|