搜索结果: 1-15 共查到“知识库 工学 SECURE”相关记录33条 . 查询时间(0.078 秒)
The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation.Barthe, D’Argenio, and Rezk coined the term “self-composition...
Maturity and Performance of Programmable Secure Computation
secure computation Performance
2015/12/22
Secure computation (SC) stands for a group of technologies for computing functions
of private inputs, while keeping the inputs themselves hidden. The canonical
example of secure computation is the m...
We present a new class of signature schemes based on properties of certain bilinear algebraic maps. These signatures are secure against existential forgery under a chosen message attack in the standar...
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption
Cryptosystems Built Identity Based Encryption
2015/8/5
Recently, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure encryption from identity-based encryption in the standard model. We improve the efficiency of their construction...
We present a fully secure Identity Based Encryption scheme whose proof of security does not rely on the random oracle heuristic. Security is based on the Decision Bilinear Diffie-Hellman assumption. T...
Circular-Secure Encryption from Decision Diffie-Hellman
Decision Diffie-Hellman Circular-Secure Encryption
2015/8/5
We describe a public-key encryption system that remains secure even encrypting messages that depend on the secret keys in use. In particular, it remains secure under a ``key cycle'' usage, where we ha...
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
Secure Signatures Chosen Ciphertext Security
2015/8/5
We initiate the study of quantum-secure digital signatures and quantum chosen ciphertext
security. In the case of signatures, we enhance the standard chosen message query model
by allowing the adver...
SessionJuggler: Secure Web Login From an Untrusted Terminal Using Session Hijacking
Untrusted Terminal Secure Web Login From
2015/8/5
We use modern features of web browsers to develop a secure login system from an untrusted terminal. The system, called SessionJuggler, requires no server-side changes and no special software on the te...
Secure Location Verification A Security Analysis of GPS Signal Authentication
Location Verifi cation GPS Signal Authentication Geosecurity
2015/6/25
The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reasons for this i...
EFFICIENT AND SECURE IMAGE AND VIDEO PROCESSING AND TRANSMISSION IN WIRELESS SENSOR NETWORKS
EFFICIENT SECURE IMAGE VIDEO PROCESSING TRANSMISSION WIRELESS SENSOR NETWORKS
2015/1/20
Sensor nodes forming a network and using wireless communications are highly useful in a variety of applications including battle field (military) surveillance, building security, medical and health se...
Secure and Energy Efficient Physical Unclonable Functions
PUFs Security Physical Unclonable Functions Arbiter
2014/12/8
Physical Unclonable Functions are a unique class of circuits that leverage the inherentvariations in manufacturing process to create unique,unclonableIDs and secret keys.The distinguishing feature of ...
Toward A Secure and Scalable Internet and Economic Incentives for Evolvable Internet Architecture
Applied sciences Internet security Scalable internet Internet architecture Strategic decision making Self-owned networks
2014/11/7
The Internet consists of tens of thousands of interconnected diverse, self-owned smaller networks. These networks engage in strategic decision making to maximize their own performance or benefits. In ...
Coherent Detected Secure Point-to-Point Optical Fiber Transmission using Ultra-Dense Optical Spectral Phase Coding (UD-SPC) and Multilevel BCJR Equalization
Coherent Detected Secure Point-to-Point Optical Fiber Transmission Ultra-Dense Optical Spectral Phase Coding Multilevel BCJR Equalization
2016/12/2
A secure P2P optical fiber communication scheme based on ultra-dense optical spectral phase coding (UD-SPC) is proposed. The multi-code interference is suppressed by increasing the memory of the multi...
Secure Optical Communication Using Single Phase Modulator for Bit-by-bit Code Scrambling and DPSK Data Modulation
Fiber optics communications Optical security and encryption Phase modulation
2015/6/9
We proposed a novel bit-by-bit code-hopping scheme using single phase modulator for secure optical communication and experimentally demonstrated the transmission of 2.5Gbps DPSK data secured by scramb...
This paper studies how to take advantage of other's computing ability to sign a message with one's private key without disclosing the private key. A protocol to this problem is presented, and it is pr...