>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 Information相关记录2079条 . 查询时间(0.234 秒)
Most natural rubber trees (Hevea brasiliensis) are grown on plantations, making rubber an important industrial crop. Rubber plantations are also an important source of household income for over 20 mil...
Recently, hydrogels with adjustable mechanical properties have been developed for information security applications. However, the defects such as easy drying and inferior resistance to extreme tempera...
Whereas it is widely deemed impossible to overcome the optimality of the one-time pad (OTP) cipher in pre- and post-quantum cryptography, this work shows that the optimality of information theoretic s...
At CRYPTO 2018, Cramer et al. introduced a secret-sharing based protocol called SPDZ2kZ2k that allows for secure multiparty computation (MPC) in the dishonest majority setting over the ring of integer...
The contribution vector (convec) of a secret sharing scheme is the vector of all share sizes divided by the secret size. A measure on the convec (e.g., its maximum or average) is considered as a crite...
Best Information is Most Successful     Side-Channel Analysis  Information Theory  Guessing Entropy       font style='font-size:12px;'> 2019/5/21
Using information-theoretic tools, this paper establishes a mathematical link between the probability of success of a side-channel attack and the minimum number of queries to reach a given success rat...
Dynamic Searchable Symmetric Encryption (DSSEDSSE), apart from providing support for search operation, allows a client to perform update operations on outsourced database efficiently. Two security pro...
In (single-server) Private Information Retrieval (PIR), a server holds a large database DBDB of size nn, and a client holds an index i∈[n]i∈[n] and wishes to retrieve DB[i]DB[i] without revealing ii t...
The use of remote sensors to acquire metric information for building information modelling (BIM) of heritage buildings is now common. Problematically, the creation of models from that information is s...
When we talk about landscape and in particular landscape architecture, we refer to a living structure in continuous evolution and in clear contrast to the aesthetic and geometric immobility of the sin...
An Information Obfuscation Calculus for Encrypted Computing     Applications  foundations  information theory       font style='font-size:12px;'> 2019/1/29
Relative cryptographic semantic security for encrypted words of user data at runtime holds in the emerging field of encrypted computing, in conjunction with an appropriate instruction set and compiler...
Oblivious linear evaluation (OLE) is a two party protocol that allows a receiver to compute an evaluation of a sender's private, degree 11 polynomial, without letting the sender learn the evaluation p...
The Norik of Muran, a unique draught horse bred in Slovakia, belongs to country’s biodiversity treasures. The genetic diversity of this horse type was evaluated on the basis of indicators derived from...
This study emphasizes the use of various tools for visualizing geospatial data for facilitating information mining of the global petroleum reserves. In this paper, open-source data on global oil trade...
Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information     masking  shuffling  RNG       font style='font-size:12px;'> 2018/11/19
Side-channel countermeasure designers often face severe performance overheads when trying to protect a device. Widely applied countermeasures such as masking and shuffling entail generating a large am...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...