搜索结果: 1-9 共查到“军事学 Big Data”相关记录9条 . 查询时间(0.241 秒)
A Note on Obtain Confidentiality or/ and Authenticity in Big Data by ID-Based Generalized Signcryption
PKG IND CCA
2017/3/6
ID based generalized signcryption can adaptively work as a signature scheme, an encryption scheme or a signcryption scheme and avoid weighty and complicated certificate management like Public Key Infr...
How to Meet Big Data When Private Set Intersection Realizes Constatnt Communication Complexity
cryptographic protocols secure tow-party protocol
2017/1/3
Electronic information is increasingly often shared among unreliable entities. In this context, one interesting problem involves two parties that secretly want to determine intersection of their respe...
Secure multi-party computation (MPC) allows multiple parties to perform a joint computation without disclosing their private inputs. Many real-world joint computation use cases, however, involve data ...
Analysis of a Secure and Verifiable Policy Update Outsourcing Scheme for Big Data Access Control in the Cloud
Access Control Attribute-based Encryption Policy Updating
2016/7/5
How to flexibly change the access policy after the initial data access policy has
been set is a critical problem to promote attribute-based encryption (ABE) from a theoretical
tool to a practical to...
As big data collection and analysis becomes prevalent in today’s computing environments there is a growing need for techniques to ensure security of the collected data. To make matters worse, due to i...
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM
Oblivious RAM Secure Two-Party Computation Garbled Circuits
2016/1/26
We present a novel mechanism that allows a client to securely outsource his
private data to the cloud while at the same time to delegate to a third party the right to
run certain algorithms on his d...
MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud
public auditing integrity verification cloud computing
2016/1/9
Big data and its applications are attracting more and more research interests in recent years. As the new generation distributed computing platform, cloud computing is believed to be the most potent p...
Big data security analytics is an emerging approach to intrusion detection at the scale of a large organization. It involves a combination of automated and manual analysis of security logs and alerts ...
When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol
cryptographic protocols
2014/3/10
Large scale data processing brings new challenges to the design of privacy-preserving protocols: how to meet the increasing requirements of speed and throughput of modern applications, and how to scal...