搜索结果: 1-15 共查到“计算机科学技术 SECURE”相关记录27条 . 查询时间(0.106 秒)
Print No Evil:Three-Layer Technique Helps Secure Additive Manufacturing(图)
Print No Evil Three-Layer Technique Secure Additive Manufacturing
2017/9/5
Additive manufacturing, also known as 3-D printing, is replacing conventional fabrication processes in critical areas ranging from aerospace components to medical implants. But because the process rel...
SO YOU THINK YOU CAN SECURE YOUR MOBILE PHONE WITH A FINGERPRINT?
SECURE YOUR MOBILE PHONE FINGERPRINT
2017/4/27
No two people are believed to have identical fingerprints, but researchers at the New York University Tandon School of Engineering and Michigan State University College of Engineering have found that ...
第15届IEEE国际可靠,自动和安全计算会议(15th IEEE International Conference on Dependable, Autonomic and Secure Computing)
第15届 IEEE 国际可靠 自动 安全计算 会议
2017/4/1
As computer systems become increasingly large and complex, their Dependability, Security and Autonomy play critical role at supporting next-generation science, engineering, and commercial applications...
The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation.Barthe, D’Argenio, and Rezk coined the term “self-composition...
Maturity and Performance of Programmable Secure Computation
secure computation Performance
2015/12/22
Secure computation (SC) stands for a group of technologies for computing functions
of private inputs, while keeping the inputs themselves hidden. The canonical
example of secure computation is the m...
We present a new class of signature schemes based on properties of certain bilinear algebraic maps. These signatures are secure against existential forgery under a chosen message attack in the standar...
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption
Cryptosystems Built Identity Based Encryption
2015/8/5
Recently, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure encryption from identity-based encryption in the standard model. We improve the efficiency of their construction...
We present a fully secure Identity Based Encryption scheme whose proof of security does not rely on the random oracle heuristic. Security is based on the Decision Bilinear Diffie-Hellman assumption. T...
Circular-Secure Encryption from Decision Diffie-Hellman
Decision Diffie-Hellman Circular-Secure Encryption
2015/8/5
We describe a public-key encryption system that remains secure even encrypting messages that depend on the secret keys in use. In particular, it remains secure under a ``key cycle'' usage, where we ha...
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
Secure Signatures Chosen Ciphertext Security
2015/8/5
We initiate the study of quantum-secure digital signatures and quantum chosen ciphertext
security. In the case of signatures, we enhance the standard chosen message query model
by allowing the adver...
SessionJuggler: Secure Web Login From an Untrusted Terminal Using Session Hijacking
Untrusted Terminal Secure Web Login From
2015/8/5
We use modern features of web browsers to develop a secure login system from an untrusted terminal. The system, called SessionJuggler, requires no server-side changes and no special software on the te...
Toward A Secure and Scalable Internet and Economic Incentives for Evolvable Internet Architecture
Applied sciences Internet security Scalable internet Internet architecture Strategic decision making Self-owned networks
2014/11/7
The Internet consists of tens of thousands of interconnected diverse, self-owned smaller networks. These networks engage in strategic decision making to maximize their own performance or benefits. In ...
This paper studies how to take advantage of other's computing ability to sign a message with one's private key without disclosing the private key. A protocol to this problem is presented, and it is pr...
A secure media streaming mechanism combining encryption, authentication, and transcoding
Intelligent mid-network proxy Secure transcoding Sender authentication Media-aware encryption Media streaming
2013/7/16
Technology advancements are allowing more and more new media applications and services to be delivered over the Internet. Many of these applications and services require flexibility in media dis...
You may update your antivirus software religiously, immediately download all new Windows security patches, and refuse to click any e-mail links ostensibly sent by your bank, but even if your computer ...