搜索结果: 1-15 共查到“军事学 Enhancing”相关记录17条 . 查询时间(0.093 秒)
Enhancing Security by Combining Biometrics and Cryptography
information systems current performance results
2017/4/24
The impressive amount of recent technological advancements in the area of information systems have brought along, besides the multitude of positive aspects, some negative aspects too. The most obvious...
PePTCAP: A Privacy-enhancing Protocol for(Temporary) Car Access Provision
practical efficiency time estimations
2017/2/20
This paper proposes a novel physical keyless car sharing protocol that allows users to share their cars conveniently. In spite of many advantages, keyless car sharing systems come with substantial sec...
Enhancing Oblivious RAM Performance Using Dynamic Prefetching
Oblivious RAM locality prefetching
2016/1/23
Oblivious RAM (ORAM) is an established technique to hide the access pattern to an untrusted storage system. With ORAM, a curious adversary cannot tell what data address the user is accessing when obse...
Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials
Proxy signatures anonymous credentials cryptographic protocols
2016/1/23
Proxy signatures enable an originator to delegate the signing rights for a restricted set of messages to a proxy. The proxy is then able to produce valid signatures only for messages from this deleg...
Formal Treatment of Privacy-Enhancing Credential Systems
Privacy attribute-based credentials anonymous credentials
2016/1/7
Privacy-enhancing attribute-based credentials (PABCs) are the core ingredient to
privacy-friendly authentication systems, allowing users to obtain credentials on attributes and
prove possession of t...
FIDES: Enhancing Trust in Reconfigurable Based Hardware Systems
Design Security and Trust Hardware Trojans
2015/12/30
Extensive use of third party IP cores (e.g., HDL, netlist) and open source tools in the FPGA application design and development
process in conjunction with the inadequate bitstream protection measure...
Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency
public-key cryptography multilinear maps
2015/12/22
Cryptographic multilinear map is a useful tool for constructing numerous secure protocols
and Graded Encoding System (GES) is an approximate concept of multilinear map. In multilinear
map context, t...
Due to its low cost, robustness, flexibility and ubiquitous nature, cloud computing is changing the way entities manage their data. However, various privacy concerns arise whenever potentially sensiti...
Enhancing Attribute-Based Encryption with Attribute Hierarchy
Attribute-Based Hierarchy Encryption
2009/7/1
Attribute-based encryption (ABE) has been envisioned
as a promising cryptographic primitive for realizing secure
and flexible access control. However, ABE is being criticized
for its high scheme ov...
Privacy-Enhancing First-Price Auctions Using Rational Cryptography
Privacy-Enhancing First-Price Auctions Rational Cryptography
2009/6/9
We consider enhancing a sealed-bid single-item auction with privacy concerns, our assumption
being that bidders primarily care about monetary payoff and secondarily worry about exposing
information ...
Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems
public key cryptosystem multivariate polynomial multivariate public key cryptosystem
2009/6/5
The piece in hand (PH) is a general scheme which is applicable to any
reasonable type of multivariate public key cryptosystems for the purpose of enhancing
their security. In this paper, we propose ...
Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems
public key cryptosystem multivariate polynomial multivariate public key cryptosystem
2009/6/3
It is widely believed to take exponential time to find a solution of a system
of random multivariate polynomials because of the NP-completeness of such a task.
On the other hand, in most of multivar...
Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key ryptosystems: Public Key Without Containing All the Information of Secret Key
Multivariate Type Public Key ryptosystems Public Key Information of Secret Key
2009/4/3
Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key ryptosystems: Public Key Without Containing All the Information of Secret Key.
Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key
Enhancing CK-Model Key Compromise Impersonation Resilience Identity-based Key
2009/3/19
In 2001, Canetti and Krawczyk proposed a security model (CKmodel)
for authentication protocols. They also gave an indistinguishabilitybased
definition for key exchange protocols. Since then the mode...
Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms
One-Way Hash Algorithm Replaceable One-Way Hash Algorithm One-Way Hash Family Long Term Security
2009/3/16
One-way hash algorithms are an indispensable
tool in data security. Over the last decade or
so a number of one-way hash algorithms have
been designed and many of them have been used
in numerous ap...