>>>
搜索结果: 151-165 共查到preserving相关记录331条 . 查询时间(0.046 秒)
Storage requirements for visual data have been increasing in recent years, following the emergence of many new highly interactive multimedia services and applications for both personal and corporate ...
Group signatures are a central cryptographic primitive which allows users to sign messages while hiding their identity within a crowd of group members. In the standard model (without the random orac...
We construct both randomizable and strongly existentially unforgeable structure-preserving signatures for messages consisting of many group elements. To sign a message consisting of N = mn group ele...
Attribute Based Encryption (ABE) is a promising public-key cryptographic primitive that can be used for cryptographically enforced access control in untrusted storage. Storing data on untrusted storag...
Cloud providers are realizing the outsourced database model in the form of database-as-a-service offerings. However, security in terms of data privacy remains an obstacle because data storage and proc...
We demonstrate a prototype implementation of a provably secure protocol that supports privacy-preserving mutual authentication between a server and a constrained device. Our proposed protocol is ba...
We construct a new structure-preserving signature scheme in the efficient Type-III asymmetric bilinear group setting with signatures shorter than all existing schemes. Our signatures consist of 3 gr...
Bitcoin exchanges function like banks, securely holding their customers’ bitcoins on their behalf. Several exchanges have suffered catastrophic losses with customers permanently losing their savings....
To accomplish effective privacy protection in smart grid systems, various approaches were proposed combining information security technology with the smart grid’s new features. Diao et al. proposed ...
Recently there has been much interest in performing database queries over encrypted data to enable functionality while protecting sensitive data. One particularly efficient mechanism for executing su...
Today, recommender systems are playing an indispensable role in our daily life. However, nothing is for free – such systems have also upset the society with severe privacy concerns. In this paper, ...
We describe the use of secure multi-party computation for performing a large-scale privacy-preserving statistical study on real government data. In 2015, statisticians in Estonia conducted a big dat...
The 3D geometry of an object can be captured very efficiently using a terrestrial laser scanner. By modelling and visualisation of these 3D data, it is possible to obtain vectorized geometric informa...
Active contour models have been part of extensive research since their introduction in the late eighties, because their concept of coupling the image data with shape control is a powerful method to de...
As 3D city models are becoming available and attractive for consumer purposes in personal navigation systems or visualization applications, the hardware used to visualize these models changes from spe...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...