Zobrazeno 1 - 10
of 506
pro vyhledávání: '"Threshold cryptosystem"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Rad Hrvatske akademije znanosti i umjetnosti. Matematičke znanosti
Issue 546=25
Issue 546=25
We propose the first hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer and prove its security in the malicious adversary model. The new cryptosystem is fully distributed, i. e., public and private key generation is perfo
Publikováno v:
IEEE Transactions on Industrial Informatics. 17:8453-8463
Federated learning-based automotive navigation has recently received considerable attention, as it can potentially address the issue of weak global positioning system (GPS) signals under severe blockages, such as in downtowns and tunnels. Specificall
Autor:
N. Jeyanthi, M. Hena
Publikováno v:
Journal of Ambient Intelligence and Humanized Computing. 13:4397-4414
Big data, the upcoming technology in the field of computing, refers to a large complex dataset. It deals with large complex datasets and yields great valued information when analysed properly. Data Security has become the greatest challenge in the mi
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Syed Taqi Ali
In the early years after the invention of public key cryptography by Diffie and Hellman in 1976, the design and evaluation of public key cryptosystems has been done merely in ad-hoc manner based on trial and error. The public key cryptosystem said to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e8114ffb23dad72d005ffe67abbed33a
https://doi.org/10.4018/978-1-7998-1763-5.ch013
https://doi.org/10.4018/978-1-7998-1763-5.ch013
Publikováno v:
Information Sciences. 466:44-54
In this study, we consider an equivalence test on rational numbers in a scenario with K + 2 distributed parties, Alice, Bob, P 1 , P 2 , … , P K , where Alice has a private rational number xa, Bob has a private rational number xb, and party Pi has
Publikováno v:
Труды Института системного программирования РАН, Vol 26, Iss 2, Pp 269-274 (2018)
Information security in cloud computing technology is actively investigated by the world scientific community. They uses the internet and the central remote servers to provide and maintain data as well as applications. This users' data files can be a
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Journal of Information Security and Applications. 61:102805
The centralized exchange is one of the hottest DeFi applications based on blockchain transaction systems. However, depositing user assets to the exchanges brings the security risks of assets misappropriation. Threshold cryptosystem can effectively so