搜索结果: 1-9 共查到“军队指挥学 clustering”相关记录9条 . 查询时间(0.064 秒)
Towards a Practical Clustering Analysis over Encrypted Data
clustering mean-shift homomorphic encryption, privacy
2019/5/13
Clustering analysis is one of the most significant unsupervised machine learning tasks, and it is utilized in various fields associated with privacy issue including bioinformatics, finance and image p...
Applying Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations
side-channel attack SCA ECC
2017/12/19
Side-channel attacks are a threat to cryptographic algorithms running on embedded devices. Public-key cryptosystems, including elliptic curve cryptography (ECC), are particularly vulnerable because th...
Clustering Related-Tweak Characteristics: Application to MANTIS-6
Truncated Differential Cryptanalysis TWEAKEY MANTIS
2017/11/28
The TWEAKEY/STK construction is an increasingly popular approach for designing tweakable block ciphers that notably uses a linear tweakey schedule. Several recent attacks have analyzed the implication...
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems
trust management social secret sharing applied cryptography
2017/8/1
In distributed storage systems, documents are shared among multiple Cloud providers and stored within their respective storage servers. In social secret sharing-based distributed storage systems, shar...
LDA-Based Clustering as a Side-Channel Distinguisher
Side-Channel Analysis Data Transformation Linear Discriminant Analysis
2016/12/7
Side-channel attacks put the security of the implementations
of cryptographic algorithms under threat. Secret information can be recovered
by analyzing the physical measurements acquired during the
...
Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering
FPGA WPA2 Security
2016/6/3
WPA2-Personal is widely used to protect Wi-Fi networks against illicit access. While attackers typically use GPUs to speed up the discovery of weak network passwords, attacking random passwords is con...
Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks
Hybrid Anomaly Misdirection Blackhole
2016/1/7
Security is the biggest concern in Wireless Sensor Networks (WSNs)
especially for the ones which are deployed for military applications and
monitoring. They are prone to various attacks which degrad...
Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations
non-profiled single- execution
2014/3/11
Most implementations of public key cryptography employ exponentiation algorithms. Side-channel attacks on secret exponents are typically bound to the leakage of single executions due to cryptographic ...
The k-Means Clustering problem is one of the most-explored problems
in data mining to date. With the advent of protocols that have
proven to be successful in performing single database clustering, t...