Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Securing microservices and microservice architectures: A systematic map** study
Microservice architectures (MSA) are becoming trending alternatives to existing software
development paradigms notably for develo** complex and distributed applications …
development paradigms notably for develo** complex and distributed applications …
Overcoming security challenges in microservice architectures
The microservice architectural style is an emerging trend in software engineering that allows
building highly scalable and flexible systems. However, current state of the art provides only …
building highly scalable and flexible systems. However, current state of the art provides only …
The return of coppersmith's attack: Practical factorization of widely used RSA moduli
We report on our discovery of an algorithmic flaw in the construction of primes for RSA key
generation in a widely-used library of a major manufacturer of cryptographic hardware. The …
generation in a widely-used library of a major manufacturer of cryptographic hardware. The …
Secret Key Recovery in a {Global-Scale}{End-to-End} Encryption System
End-to-end encrypted messaging applications ensure that an attacker cannot read a user's
message history without their decryption keys. While this provides strong privacy, it creates a …
message history without their decryption keys. While this provides strong privacy, it creates a …
2.5 D root of trust: Secure system-level integration of untrusted chiplets
For the first time, we leverage the 2.5 D interposer technology to establish system-level
security in the face of hardware-and software-centric adversaries. More specifically, we …
security in the face of hardware-and software-centric adversaries. More specifically, we …
{SafetyPin}: Encrypted backups with {Human-Memorable} secrets
We present the design and implementation of SafetyPin, a system for encrypted mobile-
device backups. Like existing cloud-based mobile-backup systems, including those of Apple …
device backups. Like existing cloud-based mobile-backup systems, including those of Apple …
JCMathLib: wrapper cryptographic library for transparent and certifiable JavaCard applets
The JavaCard multi-application platform is now deployed to over twenty billion smartcards,
used in various applications ranging from banking payments and authentication tokens to …
used in various applications ranging from banking payments and authentication tokens to …
Scalable and secure virtualization of HSM with ScaleTrust
Hardware security modules (HSMs) have been utilized as a trustworthy foundation for cloud
services. Unfortunately, existing systems using HSMs fail to meet multi-tenant scalability …
services. Unfortunately, existing systems using HSMs fail to meet multi-tenant scalability …
Estonian electronic identity card: security flaws in key management
A Parsovs - 29th USENIX Security Symposium (USENIX Security …, 2020 - usenix.org
The Estonian electronic identity card (ID card) is considered to be one of the most successful
deployments of smart card-based national ID card systems in the world. The public-key …
deployments of smart card-based national ID card systems in the world. The public-key …
Order-preserving encryption using approximate common divisors
Order-preservation is a highly desirable property for encrypted databases as it allows range
queries over ciphertexts. Order-preserving encryption (OPE) is used in the encrypted …
queries over ciphertexts. Order-preserving encryption (OPE) is used in the encrypted …