搜索结果: 1-15 共查到“Token”相关记录20条 . 查询时间(0.031 秒)
Privacy-preserving auditable token payments in a permissioned blockchain system
cryptographic protocols AML
2019/9/19
Token management systems were the first application of blockchain technology and are still the most widely used one. Early implementations such as Bitcoin or Ethereum provide virtually no privacy beyo...
Implementing Token-Based Obfuscation under (Ring) LWE
implementation lattice techniques token-based program obfuscation
2019/1/2
Token-based obfuscation (TBO) is an interactive approach to cryptographic program obfuscation that was proposed by Goldwasser et al. as a potentially more practical alternative to conventional non-int...
Towards Practical Security of Pseudonymous Signature on the BSI eIDAS Token
anonymity digital signatures pseudonym
2018/12/3
In this paper we present an extension of Pseudonymous Signature introduced by the German Federal BSI authority as a part of technical recommendations for electronic identity documents. Without switchi...
Universally Composable Secure Two and Multi-party Computation in the Corruptible Tamper-Proof Hardware Token Model
tamper-proof token corruptible setup assumption
2017/11/13
In this work we introduce the corruptible token model. This model generalizes the stateless tamper-proof token model introduced by Katz (EUROCRYPT '07) and relaxes the trust assumption. Our improved m...
Round-Optimal Token-Based Secure Computation
Secure Computation Tamper-Proof Hardware Round Complexity
2015/12/23
Secure computation in the presence of tamper-proof hardware tokens is proven under the assumption that the holder of the token is only given black-box access to the functionality of the token. Startin...
Unsupervised Type and Token Identification of Idiomatic Expressions
Unsupervised Type Token Identification Idiomatic Expressions
2015/9/7
Idiomatic expressions are plentiful in everyday language, yet they remain mysterious, as it is not clear exactly how people learn and understand them. They are of special interest to linguists, psycho...
Generalized access control strategies for integrated services token passing systems
Integrated services LAN application factory automation distributed computing multimedia communication
2015/8/12
The demand for integrated services local area networks is increasing at a rapid pace with the advent of many new and exciting applications: office and factory automation, distributed computing, and mu...
The very same thing: Extending the object token concept to incorporate causal constraints on individual identity
Episodic memory Action planning Binding Force-motion analogy Medial temporal cortex Posterior parietal cortex
2015/7/21
The contributions of feature recognition, object categorization, and recollection of episodic memories to the re-identification of a perceived object as the very same thing encountered in a previous p...
Stance,Alignment,and Affiliation During Storytelling:When Nodding Is a Token of Affiliation
Stance,Alignment Storytelling Token of Affiliation
2015/4/3
Through stories, tellers communicate their stance toward what they are reporting. Story recipients rely on different interactional resources to display alignment with the telling activity and affiliat...
We study the complexity of secure computation in the tamper-proof hardware token model. Our main focus is on non-interactive unconditional two-party computation using bit-OT tokens, but we also study ...
The problem of estimating the number of unique types or distinct species in a group occurs in many fields, but is not a straightforward one. Given an arbitrary probabilistic distribution of entries to...
On secure embedded token design (Long Version) -- Quasi-looped Yao circuits and bounded leakage
Yao circuits side-channel attacks leakage-resilien mobile/embedded tokens AES HMAC SHA
2013/4/18
Within a broader context of mobile and embedded computing, the design of practical, secure tokens that can store and/or process security-critical information remains an ongoing challenge. One aspect o...
基于模糊统计的模糊Petri网token确定方法
模糊统计 模糊 Petri网 token(托肯)
2009/11/20
在模糊Petri网应用研究中,普遍存在模糊token由专家直接给出或主观假定的问题。基于这种情况,提出了通过模糊统计法来获得库所的模糊token,为成功应用模糊Petri网理论创造了条件。给出了计算模糊token的通用形式化算法。实例论证了模糊统计法在求取模糊token时的可行性与有效性。
Polymorphic worm detection using strong token-pair signatures
Polymorphic worm worm detection
2009/7/28
Malicious software has become a big threat to information systems, which are widely used to store,
transfer and process information for many critical assets. Worms are one of the most harmful network...
Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number
Authenticated key exchange pairing-based cryptosystems
2009/4/15
Authenticated key exchange protocols tend to be either to-
ken based or password based. Token based schemes are often based on
expensive (and irreplaceable) smart-card tokens, while password-only
s...