author: liqun chen

Information and Communications Security: 24th International Conference, ICICS 2022, Canterbury, UK, September 5–8, 2022, Proceedings

... communication sent or received by each party . MP - PSI [ 12 ] Topology Star [ 14 ] Star This work Tree Communication ... ( PPT ) adversary A , there exists a PPT simulator S , such that for any PPT environment Z , the output distribution ...

Security Standardisation Research: Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings

... Yuri Fujiki1, Sakura Onda1, Takeaki Kaneko1, Natsuhiko Sakimura2, and Hiroyuki Sato3(B) 1 JIPDEC, Tokyo, Japan {hokino-masatoshi,fujiki-yuri,onda-sakura,kaneko-takeaki}@jipdec.or.jp 2 Nomura Research Institute, Tokyo, Japan n-sakimura ...

Trusted Systems: Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers

... code on the target host or probe the target for open ports. In our proposed technique ... VMware Workstation/Player or VirtualBox. In the sequel, for simplicity, we ... 11,13,18]. In this case, the malware will execute malicious code if a ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.