搜索结果: 1-11 共查到“军事学 Role”相关记录11条 . 查询时间(0.187 秒)
The Role of the Adversary Model in Applied Security Research
Adversary model Mobile security IoT security
2018/12/11
Adversary models have been integral to the design of provably-secure cryptographic schemes or protocols. However, their use in other computer science research disciplines is relatively limited, partic...
Peace Works: America's Unifying Role in a Turbulent World (Book Review)
Peace Works America's Unifying Role Turbulent World
2019/10/11
Peace Works is two things: an impassioned argument on why the United States should involve itself in conflict prevention, management and peace-making; and an important contribution to the practitioner...
Role-Based Ecosystem Model for Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications
implementation secure multi-party computation
2017/8/29
Individuals and organizations face a tension between (1) the explosion in the amount of valuable data that can be collected and processed and (2) the liability of possession and the threat of exposure...
Universally Composable Cryptographic Role-Based Access Control
Access Control Universal Composability
2016/12/9
In cryptographic access control sensitive data is protected by cryptographic primitives and the desired access structure is enforced through appropriate management of the secret keys. In this paper we...
Anonymous Role-Based Access Control on E-Health Records
anonymous electronic health record privacy preserving access control
2016/2/24
Electronic Health Record (EHR) system facilitates us a lot for health record management. Privacy risk of patients' records is the dominating obstacle in the widely deployed EHRs. Role-based access con...
On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks
cryptographic protocols / Wireless sensor networks key management key predistribution expander graphs
2012/3/23
Providing security for a wireless sensor network composed of small sensor nodes with limited battery power and memory can be a non-trivial task. A variety of key predistribution schemes have been prop...
On Cryptographic Protocols Employing Asymmetric Pairings -- The Role of $\Psi$ Revisited
Cryptographic Protocols Asymmetric Pairings
2009/10/9
Asymmetric pairingse: G1 ×G2 ! GT for which an efficiently-computable
isomorphism: G2 ! G1 is known are called Type 2 pairings; if such an isomorphism
is not known then e is called a Type 3 pairin...
On the Role of PKG for Proxy Re-encryption in Identity Based Setting
PKG Proxy Re-encryption Identity Based Setting
2009/6/9
In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called
proxy re-encryption[3]. In proxy re-encryption, a proxy can transform a ciphertext computed under
Alice’s publi...
China's Energy Strategy and Primary Role of the Middle East in This Strategy
China’s Energy Strategy Primary Role the Middle East
2015/8/19
In face of challenges to its energy security, China has been making adjustments in its energy policy and energy development strategy since mid-1990s,and implementing a strategy for overseas energy dev...
On the Role of Scheduling in Simulation-Based Security
Scheduling Simulation-Based Security
2008/9/9
In a series of papers, K¨usters et al. investigated the relationships
between various notions of simulation-based security. Two main
factors, the placement of a “master process” and the existence of...
The role of help in Classical and Quantum Zero-Knowledge
Zero-Knowledge standard interactive model
2008/5/22
We study the role of help in Non-Interactive Zero-Knowledge protocols and its relation to
the standard interactive model. In the classical case, we show that help and interaction are
equivalent, ans...