>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到aggregate相关记录158条 . 查询时间(0.109 秒)
智能荧光高分子水凝胶是一类发光性能可调的高分子软材料。三维聚合物交联网络中包含大量溶剂水分子的独特结构特点,使得其不仅可兼具经典荧光高分子水溶液和固态本体材料两者共同的性能优势,还常具有一些优异的新性能,例如与生物组织相近的模量、固有的软湿特性、良好的生物相容性、以及刺激响应多功能(体积、模量、荧光等)协同变化特性等,因而在生物医用、传感检测、仿生驱动、软体机器人等领域拥有巨大应用前景,是先进发光...
An attempt to derive signer-efficient digital signatures from aggregate signatures was made in a signature scheme referred to as Structure-free Compact Rapid Authentication (SCRA) (IEEE TIFS 2017). In...
Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble     Mimblewimble  Bitcoin  commitments       font style='font-size:12px;'> 2018/11/2
Mimblewimble is an electronic cash system proposed by an anonymous author in 2016. It combines several privacy-enhancing techniques initially envisioned for Bitcoin, such as Confidential Transactions ...
Non-adaptive Group-Testing Aggregate MAC Scheme     message authentication  aggregate  group testing       font style='font-size:12px;'> 2018/5/22
This paper applies non-adaptive group testing to aggregate message authentication code (MAC) and introduces non-adaptive group-testing aggregate MAC. After formalization of its syntax and security req...
Synchronized Aggregate Signatures from the RSA Assumption     signatures  aggregate  RSA       font style='font-size:12px;'> 2018/1/25
In this work we construct efficient aggregate signatures from the RSA assumption in the synchronized setting. In this setting, the signing algorithm takes as input a (time) period tt as well the secre...
We give a framework for trapdoor-permutation-based sequential aggregate signatures (SAS) that unifies and simplifies prior work and leads to new results. The framework is based on ideal ciphers over l...
Keeping correct and informative log files is crucial for system maintenance, security and forensics. Cryptographic logging schemes offer integrity checks that protect a log file even in the case where...
In this work, we consider the Intersection-Sum problem: two parties hold datasets containing user identifiers, and the second party additionally has an integer value associated with each user identifi...
Fine-grained access control, especially in shared data environments such as the cloud, is a common scenario. Suppose a data owner encrypts and stores a collection of NN documents in the cloud, and wis...
Identity-based sequential aggregate signature (IBSAS) schemes are usually applied to secure network routing and sensor networks, since they allow multiple signers to sequentially produce a short signa...
Cryptanalysis of a certificateless aggregate signature scheme     public-key cryptography  C4I       font style='font-size:12px;'> 2016/12/26
Recently, Nie et al. proposed a certificateless aggregate signature scheme. In the standard security model considered in certificateless cryptography, we are dealing with two types of adversaries. In ...
Assessments of the human damage caused by the tsunami are required in order to consider disaster prevention at such a regional level. Hence, there is an increasing need for the assessments of human da...
Secure aggregate signature schemes have attracted more concern due to their wide application in resource constrained environment. Recently, Horng et al. [S. J. Horng et al., An efficient certificatele...
The key-aggregate cryptosystem (KAC) proposed by Chu et al. in 2014 offers a solution to the flexible access delegation problem in shared data environments such as the cloud. KAC allows a data owner...
(Sequential) Aggregate signature schemes enable a group of users u1,…,uk with messages m1,…,mk to produce a single signature Σ which states the integrity and authenticity of all the messages m1,…,mk. ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...