搜索结果: 1-15 共查到“知识库 Distance”相关记录437条 . 查询时间(0.065 秒)
Xylem-based long-distance transport and phloem remobilization of copper inSalix integraThunb
Xylem-based long-distance transport phloem remobilization Salix
font style='font-size:12px;'>
2023/6/5
Lattice Gaussian Sampling by Markov Chain Monte Carlo: Bounded Distance Decoding and Trapdoor Sampling
lattice Gaussian sampling Markov chain Monte Carlo bounded distance decoding
font style='font-size:12px;'>
2019/6/5
Sampling from the lattice Gaussian distribution plays an important role in various research fields. In this paper, the Markov chain Monte Carlo (MCMC)-based sampling technique is advanced in several f...
Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems
Program Obfuscation Hamming Distance Conjunctions
font style='font-size:12px;'>
2019/6/4
We consider the problem of obfuscating programs for fuzzy matching (in other words, testing whether the Hamming distance between an nn-bit input and a fixed nn-bit target vector is smaller than some p...
A Modified Simple Substitution Cipher With Unbounded Unicity Distance
finite-key unicity randomization
font style='font-size:12px;'>
2019/6/4
The classic simple substitution cipher is modified by randomly inserting key-defined noise characters into the ciphertext in encryption which are ignored in decryption. Interestingly, this yields a fi...
Implementation-Level Corruptions in Distance Bounding -- Exhibiting Faults and Provably-Secure Fixes in the Electronic Payment Protocol PayPass --
cryptographic protocols white-box
font style='font-size:12px;'>
2019/1/2
In relay attacks,a man-in-the-middle attacker gains access to a service by relaying the messages between two legitimate parties. Distance-bounding protocols are a countermeasure to relay attacks, wher...
Instant Privacy-Preserving Biometric Authentication for Hamming Distance
privacy-preserving biometric authentication inner product encryption learning with errors
font style='font-size:12px;'>
2018/12/24
In recent years, there has been enormous research attention in privacy-preserving biometric authentication, which enables a user to verify him or herself to a server without disclosing raw biometric i...
Formal Analysis of Distance Bounding with Secure Hardware
distance bounding RFID NFC
font style='font-size:12px;'>
2018/5/15
A distance bounding (DB) protocol is a two-party authentication protocol between a prover and a verifier which is based on the distance between the prover and the verifier. It aims to defeat threats b...
Another Look at Relay and Distance-based Attacks in Contactless Payments
Contactless Payments EMV-adaptations
font style='font-size:12px;'>
2018/5/3
Relay attacks on contactless e-payments were demonstrated in 2015. Since, countermeasures have been proposed and Mastercard has recently adopted a variant of these in their specifications. These relay...
Fine-Grained and Application-Ready Distance-Bounding Security
DB-security properties DB protocols
font style='font-size:12px;'>
2018/5/2
Distance-bounding (DB) protocols are being adopted in different applications, e.g., contactless payments, keyless entries. For DB to be application-ready, "pick-and-choose" corruption models and clear...
Anonymous Distance-Bounding Identification
Distance-Bounding Anonymous Authentication Public-Key
font style='font-size:12px;'>
2018/4/19
Anonymous Distance-Bounding (DB) protocols allow a prover to convince a verifier that they are within a distance bound from them, without revealing their identity. This is an attractive property that ...
Directional Distance-Bounding Identification Protocols
Distance-Bounding Public-Key Authentication Directional Antenna
font style='font-size:12px;'>
2018/4/19
Distance bounding (DB) protocols allow a prover to convince a verifier that they are within a distance bound. A public key distance bounding relies on the public key of the users to prove their identi...
COASTLINE DETECTION USING FUSION OF OVER SEGMENTATION AND DISTANCE REGULARIZATION LEVEL SET EVOLUTION
Coastline DRLSE FOOS K-means Clustering Sea-land Segmentation Wavelet Transform
font style='font-size:12px;'>
2018/4/18
Coastline detection is a very challenging task in optical remote sensing. However the majority of commonly used methods have been developed for low to medium resolution without specification of the ke...
COASTLINE DETECTION USING FUSION OF OVER SEGMENTATION AND DISTANCE REGULARIZATION LEVEL SET EVOLUTION
Coastline DRLSE FOOS K-means Clustering Sea-land Segmentation Wavelet Transform
font style='font-size:12px;'>
2018/5/8
Coastline detection is a very challenging task in optical remote sensing. However the majority of commonly used methods have been developed for low to medium resolution without specification of the ke...
Polynomial Time Bounded Distance Decoding near Minkowski’s Bound in Discrete Logarithm Lattices
lattice techniques Bounded Distance Decoding Minkowski's bound
font style='font-size:12px;'>
2018/2/9
We propose a concrete family of dense lattices of arbitrary dimension n in which the lattice Bounded Distance Decoding (BDD) problem can be solved in deterministic polynomial time. This construction i...
Multi-Hop Distance Estimation: How Far are You?
Distance-Bounding Distance-Estimation
font style='font-size:12px;'>
2017/7/26
Several access control systems are based on the users’ physical location/proximity to the access point. Distance- Bounding (DB) protocols constitute a classical solution to calculate the distance betw...