搜索结果: 1-11 共查到“军事学 Recognition”相关记录11条 . 查询时间(0.158 秒)
Towards real-time hidden speaker recognition by means of fully homomorphic encryption
Fully Homomorphic Encryption Neural Networks LWE
2019/8/30
Securing Neural Network (NN) computations through the use of Fully Homomorphic Encryption (FHE) is the subject of a growing interest in both communities. Among different possible approaches to that to...
Privacy-Preserving Face Recognition with Outsourced Computation
applications Outsourced Computation
2016/1/5
Face recognition is one of the most important biometrics pattern recognitions, which has been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of biometrics data ra...
An ever-increasing number of personal photos is stored online. This trend can be problematic, because face recognition software can undermine user privacy in unexpected ways. Face de-identification ai...
Some Words About Cryptographic Key Recognition In Data Streams
side-channel attacks live-memory analysis digital forensics
2012/6/14
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at least, two problems:...
Some Words About Cryptographic Key Recognition In Data Streams
side-channel attacks live-memory analysis digital forensics blowfish twofish
2012/3/21
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at least, two problems:...
Some Words About Cryptographic Key Recognition In Data Streams
side-channel attacks live-memory analysis digital forensics blowfish twofish
2012/3/22
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at least, two problems:...
Efficient Privacy-Preserving Face Recognition(Full Version)
Secure Two-Party Computation Face Recognition Privacy
2009/11/18
Automatic recognition of human faces is becoming increasingly
popular in civilian and law enforcement applications that require
reliable recognition of humans. However, the rapid improvement and
wi...
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
cryptanalysis message recognition ad hoc network
2009/9/27
At CANS 2008, Mashatan and Stinson suggested a message
recognition protocol for ad hoc pervasive networks. The protocol provides
a procedure to resynchronize in case of a (possibly adversarial) disr...
Concrete Security for Entity Recognition:The Jane Doe Protocol(Full Paper)
Concrete Security Entity Recognition Jane Doe Protocol
2009/6/12
Entity recognition does not ask whether the message is from
some entity X, just whether a message is from the same entity as a previous
message. This turns turns out to be very useful for low-end de...
A NEW MESSAGE RECOGNITION PROTOCOL FOR AD HOC PERVASIVE NETWORKS
Message Recognition Protocol Ad Hoc Pervasive Networks
2009/6/5
We propose a message recognition protocol which is suitable for ad hoc pervasive
networks without the use of hash chains. Hence, we no longer require the sensor motes to save
values of a hash chain ...
We examine the problem of message and entity recognition in the context of ad hoc
networks. We review the definitions and the security model described in the literature and examine
previous recognit...