工学 >>> 计算机科学技术 >>> 计算机科学技术基础学科 >>> 数据安全与计算机安全 >>>
搜索结果: 1-15 共查到数据安全与计算机安全 Security相关记录22条 . 查询时间(0.187 秒)
After the serious compromise of 2022, the Zebra Scientific Alliance has been compromised again – hit hard by an attacker. Zebra’s IT experts and computer emergency response teams are on the prowl, try...
Multiple programs running on the same computer may not be able to directly access each other’s hidden information, but because they share the same memory hardware, their secrets could be stolen by a m...
The International Conference on Cryptology and Network Security (CANS) is a recognized annual conference, focusing on all aspects of cryptology, and of data, network, and computer security, attracting...
This is the ninth in a series of conferences that aims to bring together the leading researchers in the areas of information theory, quantum information theory, and cryptography. ICITS covers all aspe...
Multiple encryption—the practice of composing a blockcipher several times with itself under independent keys—has received considerable attention of late from the standpoint of provable security.Despit...
We revisit the security (as a pseudorandom permutation) of cascading-based constructions for block-cipher key-length extension. Pre-vious works typically considered the extreme case where the adversar...
We initiate the study of quantum-secure digital signatures and quantum chosen ciphertext security. In the case of signatures, we enhance the standard chosen message query model by allowing the adver...
Edward Snowden’s leak of classified documents to journalists around the world about massive government surveillance programs and threats to personal privacy ultimately resulted in aPulitzer ...
This work analyzes and discusses the current security environment of today's (and future) smartphones, and proposes a security model which will reduce smartphone vulnerabilities, preserving privacy, i...
Using baseball as a metaphor, this practical, engaging session will explore the security and privacy risks with a number of technologies for storing, handling and communicating health information and ...
As we increasingly rely on the Internet to connect to everything from banks and electrical grids to medical devices and autonomous vehicles, we are exposed to new vulnerabilities that threaten our sec...
We prove that Tandem-DM, which is one of the two “classical” schemes for turning a blockcipher of 2n-bit key into a double block length hash function, has birthday-type collision resistance in the ide...
第二届国际信息安全及其应用研讨会(IWISA 2010)将于2010年10月22日至25日,在燕山大学(中国秦皇岛)举办。 此次会议由秦皇岛大学(中国)、青岛理工大学(中国)、康科迪亚大学(加拿大)、国际计算机与信息科学协会(ACIS)(美国)、特伦特大学(加拿大)、河北省自然科学基金会(中国)、河北省数学会(中国),河北省工业与应用数学协会(中国)联合举办。此次学术会议旨在加强相关主题的国际学术...
We cordially invite you to attend the 2010 International Conference on Multimedia Information Networking and Security (MINES 2010) to be held on November 4–6, 2010 in Nanjing, China. MINES2010 will be...
Mobile Ad-hoc NETworks (MANETs) are expected to play an important role in tactical military networks by providing infrastructureless communication. However, maintaining secure and instant information ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...