军事学 >>> 军事学
搜索结果: 1-11 共查到军事学 Role相关记录11条 . 查询时间(0.187 秒)
Adversary models have been integral to the design of provably-secure cryptographic schemes or protocols. However, their use in other computer science research disciplines is relatively limited, partic...
Peace Works is two things: an impassioned argument on why the United States should involve itself in conflict prevention, management and peace-making; and an important contribution to the practitioner...
Individuals and organizations face a tension between (1) the explosion in the amount of valuable data that can be collected and processed and (2) the liability of possession and the threat of exposure...
In cryptographic access control sensitive data is protected by cryptographic primitives and the desired access structure is enforced through appropriate management of the secret keys. In this paper we...
Electronic Health Record (EHR) system facilitates us a lot for health record management. Privacy risk of patients' records is the dominating obstacle in the widely deployed EHRs. Role-based access con...
Providing security for a wireless sensor network composed of small sensor nodes with limited battery power and memory can be a non-trivial task. A variety of key predistribution schemes have been prop...
Asymmetric pairingse: G1 ×G2 ! GT for which an efficiently-computable isomorphism: G2 ! G1 is known are called Type 2 pairings; if such an isomorphism is not known then e is called a Type 3 pairin...
In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption[3]. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice’s publi...
In face of challenges to its energy security, China has been making adjustments in its energy policy and energy development strategy since mid-1990s,and implementing a strategy for overseas energy dev...
In a series of papers, K¨usters et al. investigated the relationships between various notions of simulation-based security. Two main factors, the placement of a “master process” and the existence of...
We study the role of help in Non-Interactive Zero-Knowledge protocols and its relation to the standard interactive model. In the classical case, we show that help and interaction are equivalent, ans...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...