>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Equality相关记录61条 . 查询时间(0.171 秒)
Thanks to the ease of access and low expenses, it is now popular for people to store data in cloud servers. To protect sensitive data from being leaked to the outside, people usually encrypt the data ...
We propose the first multi-client predicate-only encryption scheme capable of efficiently testing the equality of two encrypted vectors. Our construction can be used for the privacy-preserving monitor...
Unmanned Aerial Vehicles (UAV) have been widely used for Digital Elevation Model (DEM) generation in geographic applications. This paper proposes a novel framework of generating DEM from UAV images. I...
At ACISP 2017, Wu et al. presented an identity-based encryption with equality test (IBEET) that considers to prevent insider attacks. To analyze its security, they proposed a new security notion for I...
Organizing Equality is a major international conference hosted by members of the Faculty of Information and Media Studies at Western University, and will take place at Museum London between the 24th a...
Access Control Encryption (ACE) is a novel paradigm for encryption which allows to control not only what users in the system are allowed to \emph{read} but also what they are allowed to \emph{write}.
Public key encryption with equality test (PKEET) is a cryptosystem that allows a tester who has trapdoors issued by one or more users UiUi to perform equality tests on ciphertexts encrypted using publ...
In this paper, we propose the concept of certificateless public key encryption with equality test (CL-PKEET) to solve the key escrow problem in IBEET. More in details, we first give the definition of ...
Equality constraints (unification constraints) have widespread use in program analysis, most notably in static polymorphic type systems. Conditional equality constraints extend equality constraints wi...
In recent years, public key encryption with equality test (PKEET) has become a hot research topic in the cryptography community due to the advancement of cloud computing. Recently, Ma et al. propose...
Group signatures are an important privacy-enhancing tool that allow to anonymously sign messages on behalf of a group. A recent feature for group signatures is controllable linkability, where a dedi...
TheJarzynskiequalityrelatesthefree-energydiferencebetweentwoequilibriumstatestotheworkdoneonasystemthrough far-from-equilibriumprocesses amilestonethatbuildsonthepioneeringworkofClausiusandKelvin.Alth...
Jerry Cohen's last book, Why Not Socialism?, is short and charming. His arguments are presented as comments on an imagined camping trip, on which, he cogently shows, most people would "strongly favor ...
The protection of the rule of law requires that the international criminal justice system focus on two key elements: (i) the substantive objective of ending impunity by bringing war criminals to justi...
“Identity Proofing” is a commercial database search product recently adopted by the US Department of Homeland Security (DHS), other government agencies, and commercial entities, paradoxically, to veri...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...