搜索结果: 1-15 共查到“知识库 Policy”相关记录987条 . 查询时间(0.078 秒)
Food Systems Transformation in Kenya: Lessons from the Past and Policy Options for the Future
Food Systems Transformation Kenya Policy Options Lessons
2024/4/1
The International Food Policy Research Institute (IFPRI), a CGIAR Research Center established in 1975, provides research-based policy solutions to sustainably reduce poverty and end hunger and ma...
华中农业大学公共管理学院开设“Public Policy in Stories. Stories in Public Policy”暑期全英文课程(图)
华中农业大学 公共管理学院 暑期全英文课程
2022/9/8
2022年8月15日至31日,香港教育大学亚洲及政策研究学系副教授(长聘)、副系主任,新加坡国立大学李光耀公共政策学院公共政策博士和经纬老师以“Public Policy in Stories. Stories in Public Policy”为主题,为华中农业大学公共管理学院学生开设了暑期全英文课程。和经纬老师主要研究专长为医疗卫生政策、社会政策改革和公共政策分析,尤其关注东亚地区的政策改革。...
一种基于Off-Policy的无模型输出数据反馈H∞ 控制方法
H∞控制 强化学习 Off-policy 数据驱动
2024/1/19
针对模型未知的线性离散系统在扰动存在条件下的调节控制问题,提出了一种基于Off-policy的输入输出数据反馈的H∞控制方法.本文从状态反馈在线学习算法出发,针对系统运行过程中状态数据难以测得的问题,通过引入增广数据向量将状态反馈策略迭代在线学习算法转化为输入输出数据反馈在线学习算法.更进一步,通过引入辅助项的方法将输入输出数据反馈策略迭代在线学习算法转化为无模型输入输出数据反馈Off-polic...
Policy-Based Sanitizable Signatures
Sanitizable Signatures Chameleon-Hashes Digital Signatures
2019/4/23
Sanitizable signatures allow a single, and signer-defined, sanitizer to modify signed messages in a controlled way without invalidating the respective signature. They turned out to be a fascinating pr...
LucidiTEE: Policy-based Fair Computing at Scale
privacy policy fair exchange trusted execution environment
2019/3/1
In light of widespread misuse of personal data, we enable users to control the sharing and use of their data, even when offline, by binding that data to policies. A policy specifies the allowed functi...
A fully distributed revocable ciphertext-policy hierarchical attribute-based encryption without pairing
Cloud computing Hierarchical attribute-based encryption Access control
2018/11/20
Several appealing features of cloud computing such as cost-effectiveness and user-friendliness have made many users and enterprises interested to outsource their sensitive data for sharing via cloud. ...
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification
Attribute-Based Encryption Authorization Classification
2018/11/5
Thanks to the ease of access and low expenses, it is now popular for people to store data in cloud servers. To protect sensitive data from being leaked to the outside, people usually encrypt the data ...
Decentralized Policy-Hiding Attribute-Based Encryption with Receiver Privacy
public-key cryptography attribute-based encryption
2018/8/21
Attribute-based encryption (ABE) enables limiting access to encrypted data to users with certain attributes. Different aspects of ABE were studied, such as the multi-authority setting (MA-ABE), and po...
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List
public-key cryptography Revocable Attribute-Based Encryption
2018/4/11
In this paper, we propose an efficient revocable Ciphertext-Policy Attribute-Based Encryption (CP-ABE) scheme. We base on the direct revocation approach, by embedding the revocation list into cipherte...
IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication
Group-based Secure Communication Ciphertext-Policy Attribute-Based Encryption ID Revocation
2017/11/20
Ciphertext-Policy Attribute-Based Encryp- tion (CP-ABE) is an access control mechanism over encrypted data and well suited for secure group-based communication. However, it also suffers from the fol- ...
HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing
Attribute-Based Access Control Encryption CP-ABE
2017/11/20
Ciphertext Policy Attribute-Based Encryption (CP- ABE) has been proposed to implement the attribute-based access control model. In CP-ABE, data owners encrypt the data with a certain access policy suc...
Zero-Knowledge Password Policy Check from Lattices
zero-knowledge password policy check set membership proof lattice-based cryptography
2017/9/13
Passwords are ubiquitous and most commonly used to authenticate users when logging into online services. Using high entropy passwords is critical to prevent unauthorized access and password policies e...
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme
lattice-based cryptography attribute-based encryption GPU computing
2017/6/26
In this paper, we report on our implementation of a lattice-based Key-Policy Attribute-Based Encryption (KP-ABE) scheme, which uses short secret keys. The particular KP-ABE scheme can be used directly...
Research, policy, and programmatic considerations from the Biomarkers Reflecting Inflammation and Nutritional Determinants of Anemia (BRINDA) project
iron vitamin A women and children policy inflammation
2018/11/15
The Biomarkers Reflecting Inflammation and Nutritional Determinants of Anemia (BRINDA) project sought to inform the interpretation of iron and vitamin A biomarkers (ferritin, serum transferrin recepto...
Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption
public-key cryptography attribute-based encryption direct chosen-ciphertext security
2017/5/31
We propose a technique of individually modifying an attribute-based encryption scheme (ABE) that is secure against chosen-plaintext attacks (CPA) into an ABE scheme that is secure against chosen-ciphe...