>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 Server相关记录111条 . 查询时间(0.086 秒)
We report an advanced web server named pssRNAit (plant specific small non-coding RNAi tool) that can be used to design a pool of small interfering RNAs (siRNAs) for highly effective, specific, and non...
We present a practical digital signature scheme built from a cryptographic hash function and a hash-then-publish digital time- stamping scheme. We also provide a simple proof of existential unforgeabi...
Suppose that there exist a user and ℓ servers S1,…,Sℓ. Each server Sj holds a copy of a database x=(x1,…,xn)∈{0,1}n, and the user holds a secret index i0∈{1,…,n}. A b error correcting T...
In (single-server) Private Information Retrieval (PIR), a server holds a large database DBDB of size nn, and a client holds an index i∈[n]i∈[n] and wishes to retrieve DB[i]DB[i] without revealing ii t...
The problem of Oblivious RAM (ORAM) has traditionally been studied in the single-server setting, but more recently the multi-server setting has also been considered. Yet it is still unclear whether th...
We investigate the problem of securely outsourcing modular exponentiations to a single, malicious computational resource. We revisit recently proposed schemes using single server and analyse them agai...
Recently, services and systems that deal with indoor spatial information are increasing. Each service or system adopts a data model that can store necessary indoor space data according to its purpose....
The paper presents a collaborative image-based 3D reconstruction pipeline to perform image acquisition with a smartphone and geometric 3D reconstruction on a server during concurrent or disjoint acqui...
We show a protocol for two-server oblivious RAM (ORAM) that is simpler and more efficient than the best prior work. Our construction combines any tree-based ORAM with an extension of a two-server priv...
Server-Aided Verification (SAV) is a method that can be employed to speed up the process of verifying signatures by letting the verifier outsource part of its computation load to a third party. Achiev...
Differential privacy is a mathematical definition of privacy for statistical data analysis. It guarantees that any (possibly adversarial) data analyst is unable to learn too much information that is...
Server-aided revocable identity-based encryption (SR-IBE), recently proposed by Qin et al. at ESORICS 2015, offers significant advantages over previous user revocation mechanisms in the scope of IBE...
随着侧绘信息化、计算机和互联网技术的不断发展,地理信息数据共享成为一个迫切需要解决的问题文中采用目前主流的Microsoft Visual Studio2013系列开发工具,以SOA架构体系为基础,采用C#和JavaScript开发地理信息共享平台结合生产实际,实现了地理信息资源的共享和管理。
Two-Server Password Authenticated Key Exchange (2PAKE) protocols apply secret sharing techniques to achieve protection against server-compromise attacks. 2PAKE protocols eliminate the need for passw...
Recently, a new framework, called secure server-designation public key encryption with keyword search (SPEKS), was introduced to improve the security of dPEKS (which suffers from the on-line keyword...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...