搜索结果: 31-45 共查到“知识库 计算机工程”相关记录1101条 . 查询时间(2.14 秒)
异构签密可以保证不同公钥密码系统之间数据传输的机密性和不可伪造性.本文定义了从无证书公钥密码环境到传统公钥密码环境(CLPKC→TPKI)异构签密方案的形式化模型,并利用双线性对提出了一个CLPKC→TPKI异构签密方案.在随机预言模型下,基于计算Diffie-Hellman和修改逆计算Diffie-Hellman困难假设,证明方案满足内部安全的机密性和不可伪造性.同时,方案满足密文匿名性,可以有...
On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards
Physical Security Small Embedded Devices COMP128-1 Implementations SIM Cards
2016/1/23
Ensuring the physical security of small embedded devices is challenging. Such devices have to be produced under strong cost con-straints, and generally operate with limited power and energy budget.How...
Bounded Rationality of Restricted Turing Machines
bounded rationality repeated games restricted Turing machine
2016/1/22
Bounded rationality aims to understand the effects of how limited rationality affects decision-making. The traditional models in game theory and multiagent system research, such as finite automata or ...
Memory-built-in quantum cloning in a hybrid solid-state spin register
Memory-built-in quantum cloning hybrid solid-state spin register
2016/1/22
As a way to circumvent the quantum no-cloning theorem, approximate quantum cloning protocols have received wide attention with remarkable applications. Copying of quantum states to memory qubits provi...
一种基于图的DL-Lite本体最小不可满足保持子集的计算方法
本体 描述逻辑 不一致处理 最小不可满足保持子集
2016/12/26
演变中的本体常出现不一致性问题,这将导致标准推理失效.针对不一致性问题,最小不可满足保持子集能够提供本体中概念不可满足的解释.计算最小不可满足保持子集是本体工程中的一项重要的非标准推理任务,但多数计算方法须借助外部的推理机,导致计算的效率不高.为了减少对推理机的依赖,本文提出了一种基于图的最小不可满足保持子集的计算方法.新的方法面向DL-Lite描述逻辑家族,将DL-Lite本体转换成图,将本体中...
云端数据异地容灾验证方案研究
云存储 异地容灾 数据完整性验证
2016/12/26
云存储中,应用异地容灾备份的方式,可有效防止大规模停电和天灾发生情况下的数据丢失.目前对于异地容灾能力的保障大多基于云存储服务提供商的合同约束,还没有高效且安全的数据异地容灾能力验证机制.针对此问题,本文提出了一种对云端数据的异地容灾能力进行验证的方案——DPBDL(Data disaster-tolerant Proving Based on Different Location),其核心思想是...
A computer memory with defects is modeled as a discrete memoryless channel with states that are statistically determined. The storage capacity is found when complete defect information is given to the...
Temperature-aware processor frequency assignment for MPSoCs using convex optimization
Temperature-aware thermal MPSoCs convex optimization
2015/8/10
The increasing processing capability of Multi-Processor Systems-on-Chips (MPSoCs) is leading to an increase in chip power dissipation, which in turn leads to significant increase in chip temperature. ...
Processor speed control with thermal constraints
Computer processors chips processors processor power function
2015/8/7
We consider the problem of adjusting speeds of multiple computer processors sharing the same thermal environment, such as a chip or multi-chip package. We assume that the speed of processor (and assoc...
EXPLODE:a Lightweight,General System for Finding Serious Storage System Errors
EXPLODE Lightweight General System Serious Storage System Errors
2015/8/7
Storage systems such as file systems, databases, and RAID systems have a simple, basic contract: you give them data, they do not lose or corrupt it. Often they store the only copy, making its irrevoca...
A Method for Fast Revocation of Public Key Certificates and Security Capabilities
Public Key Certificate Security Capabilities
2015/8/5
We present a new approach to fast certificate revocation centered around the concept of an on-line semi-trusted mediator (SEM). The use of a SEM in conjunction with a simple threshold variant of the R...
We provide evidence that breaking low-exponent RSA cannot be equivalent to factoring integers. We show that an algebraic reduction from factoring to breaking low-exponent RSA can be converted into an ...
We describe a short signature scheme which is existentially unforgeable under a chosen message attack without using random oracles. The security of our scheme depends on a new complexity assumption we...
Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing attacks apply to general software systems. Specifically, we devise a timing attack against Open...