搜索结果: 1-15 共查到“知识库 new approach”相关记录178条 . 查询时间(0.132 秒)
A New Approach to Constructing Digital Signature Schemes (Extended Paper)
digital signatures hash functions public-key cryptography
2019/6/10
A new hash-based, server-supported digital signature scheme was proposed recently. We decompose the concept into forward-resistant tags and a generic cryptographic time-stamping service. Based on the ...
A New Approach to Modelling Centralised Reputation Systems
group signatures direct anonymous attestation reputation systems
2019/5/9
A reputation system assigns a user or item a reputation value which can be used to evaluate trustworthiness. Bl{\"o}mer, Juhnke and Kolb in 2015, and Kaafarani, Katsumata and Solomon in 2018, gave for...
A NEW APPROACH FOR ACCURACY IMPROVEMENT OF PULSED LIDAR REMOTE SENSING DATA
Time interval measurement Pulsed lidar Data quality Capacitor charge Voltage curve Remote sensing
2018/5/17
In remote sensing applications, the accuracy of time interval measurement is one of the most important parameters that affect the quality of pulsed lidar data. The traditional time interval measuremen...
Mounting deanonymization attacks on the unreachable Bitcoin nodes -- these nodes do not accept incoming connections -- residing behind the NAT is a challenging task. Such an attack was first given by ...
A New Approach to Black-Box Concurrent Secure Computation
black-box construction concurrent security multi-party computation
2018/3/7
We consider the task of constructing concurrently composable protocols for general secure computation by making only black-box use of underlying cryptographic primitives. Existing approaches for this ...
Multiplication and Division over Extended Galois Field GF(pqpq): A new Approach to find Monic Irreducible Polynomials over any Galois Field GF(pqpq).
Galois Field Finite field Irreducible Polynomials (IPs)
2017/6/9
Irreducible Polynomials (IPs) have been of utmost importance in generation of substitution boxes in modern cryptographic ciphers. In this paper an algorithm entitled Composite Algorithm using both mul...
New Approach to Practical Leakage-Resilient Public-Key Cryptography
leakage-resilient public-key encryption key exchange protocols
2017/5/25
We present a new approach to construct several leakage-resilient cryptographic primitives, including public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key...
We present a new approach towards constructing round-optimal secure multiparty computation (MPC) protocols against malicious adversaries without trusted setup assumptions. Our approach builds on ideas...
A New Approach for Practical Function-Private Inner Product Encryption
Functional encryption inner product encryption function privacy
2017/2/20
Functional Encryption (FE) is a new paradigm supporting restricted decryption keys of function ff that allows one to learn f(xj)f(xj) from encryptions of messages xjxj. A natural and practical securit...
NEW APPROACH FOR SEGMENTATION AND EXTRACTION OF SINGLE TREE FROM POINT CLOUDS DATA AND AERIAL IMAGES
Segmentation Boundary Lines 3D Model Biomass Single Tree
2016/12/1
This paper addresses a new approach for reconstructing a 3D model from single trees via Airborne Laser Scanners (ALS) data and aerial images. The approach detects and extracts single tree from ALS dat...
New Approach for forest inventory estimation and timber harvesting planning in mountain areas: the SLOPE project
Digital Forest models 3D Terrestrial Laser scanning UAV Computer Graphics Forest production
2016/7/28
Forests represent an important economic resource for mountainous areas being for a few region and mountain communities the main form of income. However, wood chain management in these contexts differs...
The New Approach to Camera Calibration–GCPs or TLS Data?
Calibration OpenCV BLOB Detectors Corner Detectors TLS calibration field
2016/7/27
Camera calibration is one of the basic photogrammetric tasks responsible for the quality of processed products. The majority of calibration is performed with a specially designed test field or during ...
CO-REGISTRATION OF MULTITEMPORAL UAV IMAGE DATASETS FOR MONITORING APPLICATIONS:A NEW APPROACH
Multi-temporal UAV image-based approach image registration photogrammetry
2016/7/5
In the last years we have witnessed a rapid development of UAVs (Unmanned Aerial Vehicles), especially for image collection. One of the advantages is the possibility to perform high resolution and rep...
Several geocoding methods for SAR interferometry are compared. The discussion results in the proposal of a new geocod-
ing model. It is based on a least squares adjustment co mbining interfero...
THE UBERCRYPT FRAMEWORK: A NEW APPROACH IN CRYPTOSYSTEMS
secret-key cryptography stream ciphers geometry number theory
2016/1/6
This article describes a novel and unique cryptosystem making use of a small set of private
security parameters and public initialization values to produce a pseudorandom byte stream with large
peri...