搜索结果: 1-6 共查到“军事学 Pattern Matching”相关记录6条 . 查询时间(0.049 秒)
A Simple Obfuscation Scheme for Pattern-Matching with Wildcards
obfuscation generic group virtual black box
2018/3/5
We give a simple and efficient method for obfuscating pattern matching with wildcards. In other words, we construct a way to check an input against a secret pattern, which is described in terms of pre...
SWiM: Secure Wildcard Pattern Matching From OT Extension
Pattern Matching Oblivious Transfer PRF
2017/11/28
Suppose a server holds a long text string and a receiver holds a short pattern string. Secure pattern matching allows the receiver to learn the locations in the long text where the pattern appears, wh...
Pattern Matching on Encrypted Streams: Applications to DPI and searches on genomic data
searchable encryption pattern-matching cloud computing
2017/2/23
Pattern matching is essential to applications such as filtering content in Data streams, searching on genomic data, and searching for correlation in medical data. However, increasing concerns of user ...
Outsourced Pattern Matching
pattern matching delegatable computation simulation-based security
2016/1/7
In secure delegatable computation, computationally weak devices (or clients) wish to outsource their
computation and data to an untrusted server in the cloud. While most earlier work considers the ge...
Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation
secret key helper data
2014/3/10
Physically Unclonable Functions (PUFs) provide a unique signature for integrated circuits (ICs), similar to a fingerprint for humans. They are primarily used to generate secret keys, hereby exploiting...
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
Efficient Protocols Set Intersection Pattern Matching Malicious and Covert Adversaries
2009/6/11
In this paper we construct efficient secure protocols for set intersection and pattern match-
ing. Our protocols for securely computing the set intersection functionality are based on secure
pseudor...