工学 >>> 力学 农业工程 林业工程 工程与技术科学基础学科 测绘科学技术 材料科学 矿山工程技术 石油与天然气工程 冶金工程技术 机械工程 光学工程 仪器科学与技术 动力与电气工程 能源科学技术 核科学技术 电子科学与技术 信息与通信工程 控制科学与技术 计算机科学技术 化学工程 纺织科学技术 印刷工业 服装工业、制鞋工业 轻工技术与工程 食品科学技术 土木建筑工程 水利工程 交通运输工程 船舶与海洋工程 航空、航天科学技术 兵器科学与技术 环境科学技术 安全科学技术 工业设计
搜索结果: 1-15 共查到知识库 工学 SECURE相关记录33条 . 查询时间(0.125 秒)
The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation.Barthe, D’Argenio, and Rezk coined the term “self-composition...
Secure computation (SC) stands for a group of technologies for computing functions of private inputs, while keeping the inputs themselves hidden. The canonical example of secure computation is the m...
We present a new class of signature schemes based on properties of certain bilinear algebraic maps. These signatures are secure against existential forgery under a chosen message attack in the standar...
Recently, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure encryption from identity-based encryption in the standard model. We improve the efficiency of their construction...
We present a fully secure Identity Based Encryption scheme whose proof of security does not rely on the random oracle heuristic. Security is based on the Decision Bilinear Diffie-Hellman assumption. T...
We describe a public-key encryption system that remains secure even encrypting messages that depend on the secret keys in use. In particular, it remains secure under a ``key cycle'' usage, where we ha...
We initiate the study of quantum-secure digital signatures and quantum chosen ciphertext security. In the case of signatures, we enhance the standard chosen message query model by allowing the adver...
We use modern features of web browsers to develop a secure login system from an untrusted terminal. The system, called SessionJuggler, requires no server-side changes and no special software on the te...
The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reasons for this i...
Sensor nodes forming a network and using wireless communications are highly useful in a variety of applications including battle field (military) surveillance, building security, medical and health se...
Physical Unclonable Functions are a unique class of circuits that leverage the inherentvariations in manufacturing process to create unique,unclonableIDs and secret keys.The distinguishing feature of ...
The Internet consists of tens of thousands of interconnected diverse, self-owned smaller networks. These networks engage in strategic decision making to maximize their own performance or benefits. In ...
A secure P2P optical fiber communication scheme based on ultra-dense optical spectral phase coding (UD-SPC) is proposed. The multi-code interference is suppressed by increasing the memory of the multi...
We proposed a novel bit-by-bit code-hopping scheme using single phase modulator for secure optical communication and experimentally demonstrated the transmission of 2.5Gbps DPSK data secured by scramb...
This paper studies how to take advantage of other's computing ability to sign a message with one's private key without disclosing the private key. A protocol to this problem is presented, and it is pr...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...