工学 >>> 计算机科学技术 >>> 计算机科学技术基础学科 人工智能 计算机系统结构 计算机软件 计算机工程 计算机应用 计算机科学技术其他学科
搜索结果: 1-13 共查到计算机科学技术 Signatures相关记录13条 . 查询时间(0.125 秒)
When digital signature is applied on low-power de-vices, like smart cards, wireless sensors and RFID tags, some spe-cific properties, e.g., better offline storage, more modular and flex-ible deploymen...
The Heating Ventilation and Air Conditioning(HVAC) systems in subway stations are energy consuming giants,each of which may consume over 10, 000 Kilowatts per day for cooling and ventilation. To save ...
We describe a short signature scheme which is existentially unforgeable under a chosen message attack without using random oracles. The security of our scheme depends on a new complexity assumption we...
An aggregate signature scheme is a digital signature that supports aggregation: Given n signatures on n distinct messages from n distinct users, it is possible to aggregate all these signatures into a...
A signature system is said to be strongly unforgeable if the signature is existentially unforgeable and, given signatures on some message M, the adversary cannot produce a new signature on M. Strongly...
Group signatures have recently become important for enabling privacy-preserving attestation in projects such as Microsoft's {\sc ngscb} effort (formerly Palladium). Revocation is critical to the secur...
We construct a short group signature scheme. Signatures in our scheme are approximately the size of a standard RSA signature with the same security. Security of our group signature is based on the Str...
We construct the first homomorphic signature scheme that is capable of evaluating multivariate polynomials on signed data. Given the public key and a signed data set, there is an efficient algorithm t...
Our scheme can be used to authenticate linear transformations of signed data, such as those arising when computing mean and least squares fit or in networks that use network coding. Our construction g...
We initiate the study of quantum-secure digital signatures and quantum chosen ciphertext security. In the case of signatures, we enhance the standard chosen message query model by allowing the adver...
We give a classification of blockwise symmetric signatures in the theory of matchgate computations. The main proof technique uses matchgate identities, also known as useful GrassmannPlücker identitie...
The proposed method aims to provide a new tool for texture recognition. For this purpose, a set of texture samples are decomposed by using the FastICA algorithm and characterized by a negentropy based...
Malicious software has become a big threat to information systems, which are widely used to store, transfer and process information for many critical assets. Worms are one of the most harmful network...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...