>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Compromise相关记录21条 . 查询时间(0.094 秒)
Modern secure messaging protocols such as Signal can offer strong security guarantees, in particular Post-Compromise Security (PCS). The core PCS mechanism in these protocols is inherently pairwise, w...
Proxy Re-Encryption (PRE), introduced by Bellare et. al, allows a ciphertext encrypted using a key pki to be re-encrypted by a third party so that it is an encryption of the same message under a new k...
We aim to understand the best possible security of a (bidirectional) cryptographic channel against an adversary that may arbitrarily and repeatedly learn the secret state of either communicating party...
An updatable encryption scheme allows to periodically rotate the encryption key and move already existing ciphertexts from the old to the new key. These ciphertext updates are done with the help of a ...
Balancing the impacts of climate change risks for all involved may not be within the realm of economics or physics, but a novel approach may help to achieve a better compromise, according to Penn Stat...
In this work we study communication with a party whose secrets have already been compromised. At first sight, it may seem impossible to provide any type of security in this scenario. However, under s...
Harmful impacts of floods are the result of an interaction between extreme hydrological events and environmental, social, and economic processes. Flood management should consider many diverse aspects ...
One of the sectors that have undergone particularly dramatic transformations since the beginning of the opening-up of the Chinese economy in the late 1970s is health care. The cost of health care has ...
Objective: To compare intra-operative and post-operative complications as well as recurrence in women withendometrial cancer undergoing surgical stagingwith robotic-assisted laparoscopic hysterectomy ...
This file contains examples of the generalized quantum permanent compromise attack to the Blum- Micali construction. The examples presented here illustrate the attack described in the paper published...
This short communication analyzes the importance of resolving meso-scale structure in a complex system with multi-scale structure. Similar mechanisms for the formation of meso-scale structures in diff...
Recently, Dario Fiore and Rosario Gennaro proposed the IB-KA protocol, which was inspired by MQV protocol. They provide a full proof of security of IB-KA protocol using techniques developed by Kraw...
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models c...
Taki Homosoto, silver haired Chairman of Japan's huge OSO Industries, survived Hiroshima; his family didn't. Homosoto promises revenge against the United States before he dies. His passionate, almost ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...