搜索结果: 1-6 共查到“mobile applications”相关记录6条 . 查询时间(0.09 秒)
Private Set Intersection for Unequal Set Sizes with Mobile Applications
Private set intersection Bloom filter oblivious pseudorandom function
2017/7/11
Private set intersection (PSI) is a cryptographic technique that is applicable to many privacy-sensitive scenarios. For decades, researchers have been focusing on improving its efficiency in both comm...
GEO-SPATIAL DATA HANDLING FOR WEB-BASED AND MOBILE APPLICATIONS
GEO-SPATIAL DATA HANDLING WEB-BASED MOBILE APPLICATIONS
2015/3/16
GEO-SPATIAL DATA HANDLING FOR WEB-BASED AND MOBILE APPLICATIONS.
Architecting Protocols to Enable Mobile Applications in Diverse Wireless Networks
Application Cellular DTNs Mobile Networking Performance
2014/12/18
The goal of this thesis is to architect robust protocols that overcome disruptions and enable applications in diverse mobile networks. Mobile users operate in diverse environments, starting from mostl...
Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds
cryptographic protocols key management
2012/3/20
Cloud computing confers strong economic advantages, but many clients are reluctant to implicitly trust a third-party cloud provider. To address these security concerns, data may be transmitted and sto...
Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds
cryptographic protocols key management
2012/6/14
Cloud computing confers strong economic advantages, but many clients are reluctant to implicitly trust a third-party cloud provider. To address these security concerns, data may be transmitted and sto...
Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds
cryptographic protocols key management
2012/8/28
Cloud computing confers strong economic advantages, but many clients are reluctant to implicitly trust a third-party cloud provider. To address these security concerns, data may be transmitted and sto...