搜索结果: 1-6 共查到“军事学 streams”相关记录6条 . 查询时间(0.046 秒)
Pattern Matching on Encrypted Streams: Applications to DPI and searches on genomic data
searchable encryption pattern-matching cloud computing
2017/2/23
Pattern matching is essential to applications such as filtering content in Data streams, searching on genomic data, and searching for correlation in medical data. However, increasing concerns of user ...
A HYBRID APPROACH FOR THE SECURE TRANSMISSION OF H.264/AVC VIDEO STREAMS
H.264/AVC video RC4 encryption public key cryptosystem
2015/12/30
In order to keep privacy and to maintain security of a data; it was necessary
to keep the data in hidden manner or in a crypt format. The proposed work describes the
encryption and data hiding techn...
Towards Efficient Private Distributed Computation on Unbounded Input Streams
cryptographic protocols Secure-Multi-Party-Computation'Streamin Input
2013/4/18
In the problem of private ``swarm'' computing, $n$ agents wish to securely and distributively perform a computation on common inputs, in such a way that even if the entire memory contents of some of t...
Some Words About Cryptographic Key Recognition In Data Streams
side-channel attacks live-memory analysis digital forensics
2012/6/14
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at least, two problems:...
Some Words About Cryptographic Key Recognition In Data Streams
side-channel attacks live-memory analysis digital forensics blowfish twofish
2012/3/21
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at least, two problems:...
Some Words About Cryptographic Key Recognition In Data Streams
side-channel attacks live-memory analysis digital forensics blowfish twofish
2012/3/22
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at least, two problems:...