搜索结果: 1-15 共查到“Authenticity”相关记录25条 . 查询时间(0.078 秒)
Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher
Leakage-resilience authenticated encryption leveled implementation
2019/5/9
This paper presents CONCRETE (Commit-Encrypt-Send-the-Key) a new Authenticated Encryption mode that offers CIML2 security, that is, ciphertext integrity in the presence of nonce misuse and side-channe...
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality
OCB2 Authenticated Encryption Cryptanalysis
2019/3/21
We present practical attacks on OCB2. This mode of operation of a blockcipher was designed with the aim to provide particularly efficient and provably-secure authenticated encryption services, and sin...
A Note on Obtain Confidentiality or/ and Authenticity in Big Data by ID-Based Generalized Signcryption
PKG IND CCA
2017/3/6
ID based generalized signcryption can adaptively work as a signature scheme, an encryption scheme or a signcryption scheme and avoid weighty and complicated certificate management like Public Key Infr...
Recently in language pedagogy, common to focus on need for ‘authentic’ language.
Improved Authenticity Bound of EAX, and Refinements
Authenticated encryption EAX security bound
2014/3/5
EAX is a mode of operation for blockciphers to implement an authenticated encryption. The original paper of EAX proved that EAX is unforgeable up to $O(2^{n/2})$ data with one verification query. Howe...
Digital Media in Archaeological Areas, Virtual Reality, Authenticity and Hyper-Tourist Gaze
Archaeology Authenticity Digital Media Edutainment Museums Tourism Virtual Reality
2013/1/31
The increasingly widespread use of digital media and “virtual reality” in archaeological areas seems to confirm the passage from the traditional tourist gaze to a new hyper-tourist gaze. Archaeologica...
Digital Media in Archaeological Areas, Virtual Reality, Authenticity and Hyper-Tourist Gaze
Archaeology Authenticity Digital Media Edutainment Museums Tourism Virtual Reality
2013/9/5
The increasingly widespread use of digital media and “virtual reality” in archaeological areas seems to confirm the passage from the traditional tourist gaze to a new hyper-tourist gaze. Archaeologica...
Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity
secret-key cryptography / Information-theoretic security non-malleability relations among notions of security
2012/3/29
Roughly speaking, an encryption scheme is said to be non-malleable, if no adversary can modify a ciphertext so that the resulting message is meaningfully related to the original message. We compare th...
Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity
Characterization information-theoretic non-malleability secrecy authenticity
2011/3/10
Roughly speaking, an encryption scheme is said to be non-malleable, if
no adversary can modify a ciphertext so that the resulting message is mean-
ingfully related to the original message. We compar...
Document Logic: Risk Analysis of Business Processes through Document Authenticity
Formal methods business process modeling risk analysis internal control rewriting logic
2014/3/11
Document Logic is a simple yet powerful framework to infer risks in business processes. We focus on flows of documents and build a set of inference rules based on document authenticity and a simple tr...
Get a Real Job:Authenticity on the Performance,Reception and Study of Celebrity
authenticity politics celebrity fans public opinion
2009/11/27
This paper considers the place of attraction within debates on normative citizenship. Reconsidering my research on public reactions to UK Tory MP Boris Johnson, I ask if apparently superficial commen...
Caroline Bainbridge (2007)The Cinema of Lars von Trier:Authenticity and Artifice Wallflower Press
Caroline Bainbridge Lars von Trier Authenticity and Artifice Wallflower Press
2009/11/24
For his special achievement in the realm of European Cinema, Lars von Trier recently
received the 2008 Bremen Film Prize (Bremer Filmpreis) at the opening ceremony of this
year’s Bremen Internationa...
THE LANGUAGE OF FILM:CORPORA AND STATISTICS IN THE SEARCH FOR AUTHENTICITY. NOTTING HILL (1988) A CASE STUDY.
Film text analysis translation subtitling corpora
2009/10/19
While it is well known that film scripts generally fall short of capturing the varied and subtle characteristics of spontaneous dialogue, it is less clear exactly how and to what extent such language ...
Filmic Performance – Authenticity and The Apple
Filmic Performance Authenticity The Apple
2009/10/16
Performance is overtly untheorised within the debates that surround film studies even though ideas about realism are very well rehearsed. What might be some of the issues raised by the scrutiny of fil...
Simplification in graded readers:Measuring the authenticity of graded texts
graded readers simplification authenticity high/low frequency words random distribution blandness homogeneity repetition redundancy
2009/8/5
This study examines the characteristics and quality of simplification in graded readers as compared to those of 'normal' authentic English. Two passages from graded readers are compared with the origi...