>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 Operations相关记录185条 . 查询时间(0.029 秒)
A Mediterranean holm oak forest was subjected to experimental partial rainfall exclusion during 21 consecutive years to study the effects of the expected decrease in water availability for Mediterrane...
The increasing communication capabilities of vehicles are paving the way for promising road safety and traffic management applications. But the rise of connected vehicles also potentially introduces m...
We present a fully homomorphic encryption scheme continuing the line of works of Ducas and Micciancio (2015, [DM15]), Chillotti et al. (2016, [CGGI16a]; 2017, [CGGI17]; 2018, [CGGI18a]), and Gao (2018...
In this work, we examine the efficiency of protocols for secure evaluation of basic mathematical functions (sqrt,sin,arcsinsqrt,sin,arcsin, amongst others), essential to various application domains. e...
Remote sensing and Geographical Information System (GIS) through Earth Observation (EO) Satellites have become most important tools for many of the societal applications of day-to-day life, during the...
With the end of full-scale combat operations in Iraq in late April 2003, no one at the senior level in Washington or Baghdad expected an organized insurgency to materialize—a “war after the war” was u...
This paper describes the use of podcasts as learning aid in the teaching of operations management, particularly in a Simulation class. A podcast is a digital recording of a radio program, which is n...
Industrial services have been recognized as a lucrative source of revenue, and many capital goods manufacturers are increasingly getting involved with the aftermarket in their industry. The manufact...
We show new constructions of semi-honest and malicious two-round multiparty secure computation protocols using only (a fixed) poly(n,λ)poly(n,λ) invocations of a two-round oblivious transfer protocol ...
A number of homomorphic encryption application areas, such as privacy-preserving machine learning analysis in the cloud, could be better enabled if there existed a general solution for combining suffi...
In 2014, Smart and Vercauteren introduced a packing technique for homomorphic encryption schemes by decomposing the plaintext space using the Chinese Remainder Theorem. This technique allows to encryp...
Is it possible that a block cipher apparently immune to classical differential cryptanalysis can be attacked considering a different operation on the message space? Recently Calderini and Sala showed ...
Recently, server-with-computation model has been applied in Oblivious RAM scheme to achieve constant communication (constant number of blocks). However, existing works either result in large block siz...
In this paper, we present several methods to improve the evaluation of homomorphic functions, both for fully and for leveled homomorphic encryption. We propose two packing methods, in order to decreas...
Fully homomorphic encryption allows cloud servers to evaluate any computable functions for clients without revealing any information. It attracts much attention from both of the scientific community a...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...