搜索结果: 256-270 共查到“操作系统与操作环境”相关记录778条 . 查询时间(4.277 秒)
Bugs as Deviant Behavior:A General Approach to Inferring Errors in Systems Code
Bugs as Deviant Behavior Inferring Errors Systems Code
2015/8/7
A major obstacle to finding program errors in a real system is knowing what correctness rules the system must obey. These rules are often undocumented or specified in an ad hoc manner. This paper demo...
The ITTC project provides tools and an infrastructure for building intrusion tolerant applications. Rather than prevent intrusions or detect them after the fact, the ITTC system ensures that the compr...
Exchange of digitally signed certificates is often used to establish mutual trust between strangers that wish to share resources or to conduct business transactions. Automated Trust Negotiation (ATN) ...
We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffi...
Hierarchical Identity Based Encryption with Constant Size Ciphertext
Constant Size Ciphertext Based Encryption
2015/8/5
We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of just three group elements and decryption requires only two bilinear map computations, independent of ...
We initiate the formal study of functional encryption by giving precise definitions of the concept and its security. Roughly speaking, functional encryption supports restricted secret keys that enable...
Framing attacks on smart phones and dumb routers: tap-jacking and geo-localization attacks
smart phones and dumb routers geo-localization attacks
2015/8/5
While many popular web sites on the Internet use frame busting to defend against clickjacking, very few mobile sites use frame busting. Similarly, few embedded web sites such as those used on home rou...
We study the security of popular password managers and their policies on automatically filling in Web passwords. We examine browser built-in password managers, mobile password managers, and 3rd party ...
广东工业大学计算机学院操作系统英文课件Chapter12 Operating System Design
广东工业大学计算机学院 操作系统 英文 课件 Chapter12 Operating System Design
2015/7/31
广东工业大学计算机学院操作系统英文课件Chapter12 Operating System Design。
广东工业大学计算机学院操作系统英文课件Chapter11 Case Study 2:Windows 2000
广东工业大学计算机学院 操作系统 英文 课件 Chapter11 Case Study 2:Windows 2000
2015/7/31
广东工业大学计算机学院操作系统英文课件Chapter11 Case Study 2:Windows 2000。
广东工业大学计算机学院操作系统英文课件Chapter10 Case Study 1:UNIX and LINUX
广东工业大学计算机学院 操作系统 英文 课件 Chapter10 Case Study 1:UNIX and LINUX
2015/7/30
广东工业大学计算机学院操作系统英文课件Chapter10 Case Study 1:UNIX and LINUX。
广东工业大学计算机学院操作系统英文课件Chapter9 Security。
广东工业大学计算机学院操作系统英文课件Chapter8 Multiple Processor Systems
广东工业大学计算机学院 操作系统 英文 课件 Chapter8 Multiple Processor Systems
2015/7/30
广东工业大学计算机学院操作系统英文课件Chapter8 Multiple Processor Systems。
广东工业大学计算机学院操作系统英文课件Chapter7 Multimedia。
广东工业大学计算机学院操作系统英文课件Chapter6 File Systems。