搜索结果: 1-2 共查到“Mitigation Techniques”相关记录2条 . 查询时间(0.062 秒)
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
2019/4/22
In recent years, a number of attacks have been developed that can reconstruct encrypted one-dimensional databases that support range queries under the persistent passive adversary model. These attacks...
High Integrity Multipath Mitigation Techniques for Ground Reference Stations
High Integrity Multipath Mitigation Techniques Ground Reference Stations
2015/6/29
There is an increasing demand for accuracy, integrity,continuity and availability in the ongoing develop ment of differential GPS (DGPS) techniques. DGPS performance relies on the elimination of error...