搜索结果: 31-45 共查到“access”相关记录490条 . 查询时间(0.275 秒)
How social network heterogeneity facilitates lexical access and lexical prediction
Social networks Variability Lexical access
<
2017/8/30
People learn language from their social environment. As individuals differ in their social networks, they might be exposed to input with different lexical distributions, and these might influence thei...
Binary Hash Tree based Certificate Access Management
Binary tree certificate access management
<
2017/8/10
We present a certificate access management system to support the USDOT's proposed rule on Vehicle-to-Vehicle (V2V) communications, Federal Motor Vehicle Safety Standard (FMVSS) No.~150. Our proposal, ...
Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs
Searchable Encryption Access Control Hardware Implementation
<
2017/7/11
The advent of cloud computing offers clients with the opportunity to outsource storage and processing of large volumes of shared data to third party service providers, thereby enhancing overall access...
Can We Access a Database Both Locally and Privately?
private information retrieval locally decodable codes
<
2017/6/15
We consider the following strong variant of private information retrieval (PIR). There is a large database x that we want to make publicly available. To this end, we post an encoding X of x together w...
Access Control Encryption for General Policies from Standard Assumptions
access control encryption functional encryption information flow control
<
2017/5/31
Functional encryption enables fine-grained access to encrypted data. In many scenarios, however, it is important to control not only what users are allowed to read (as provided by traditional function...
Strengthening Access Control Encryption
Access control encryption Information flow control Chosen-ciphertext attacks
<
2017/5/23
Access control encryption (ACE) was proposed by Damgård et al. to enable the control of information flow between several parties according to a given policy specifying which parties are, or are n...
贝克曼库尔特ACCESS 2全自动免疫分析系统(图)
免疫分析系统 临汾市人民医院 微粒子
<
2023/12/27
Access 2是贝克曼库尔特公司研发推出的新一代全自动微粒子全自动免疫分析系统。
Key-Aggregate Searchable Encryption with Constant-Size Trapdoors for Fine-Grained Access Control in the Cloud
Searchable Encryption Access Control Data Privacy
<
2017/4/17
Fine-grained access control, especially in shared data environments such as the cloud, is a common scenario. Suppose a data owner encrypts and stores a collection of NN documents in the cloud, and wis...
Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control
Ransomware Access Control
<
2017/3/6
In this work we investigate the problem of using public consensus networks -- exemplified by systems like Ethereum and Bitcoin -- to perform cryptographic functionalities that involve the manipulation...
Multi-level Access in Searchable Symmetric Encryption
searchable encryption access control searchable symmetric encryption
<
2017/3/1
Remote storage delivers a cost effective solution for data storage. If data is of a sensitive nature, it should be encrypted prior to outsourcing to ensure confidentiality; however, searching then bec...
Access Control Encryption for Equality, Comparison, and More
Access Control Encryption pairings predicates
<
2017/2/20
Access Control Encryption (ACE) is a novel paradigm for encryption which allows to control not only what users in the system are allowed to \emph{read} but also what they are allowed to \emph{write}.
PePTCAP: A Privacy-enhancing Protocol for(Temporary) Car Access Provision
practical efficiency time estimations
<
2017/2/20
This paper proposes a novel physical keyless car sharing protocol that allows users to share their cars conveniently. In spite of many advantages, keyless car sharing systems come with substantial sec...
Zero Round-Trip Time for the Extended Access Control Protocol
zero-RTT protocols authenticated key exchange extended access control protocol
<
2017/2/20
The Extended Access Control (EAC) protocol allows to create a shared cryptographic key between a client and a server. It is for instance referenced by the International Civil Aviation Organization for...
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
access control cloud
<
2017/2/20
Enabling access controls for data hosted on untrusted cloud is attractive for many users and organizations. Recently, many works have been proposed to use advanced cryptographic primitives such as ide...
安徽师范大学计算机基础(公共课)课件第6章 Access 2003
安徽师范大学 计算机 课件 第6章 Access 2003
<
2017/1/14
安徽师范大学计算机基础(公共课)课件第6章 Access 2003。