Zobrazeno 1 - 10
of 153
pro vyhledávání: '"Unique key"'
Publikováno v:
Modelirovanie i Analiz Informacionnyh Sistem, Vol 27, Iss 1, Pp 22-38 (2020)
Traceability schemes which are applied to the broadcast encryption can prevent unauthorized parties from accessing the distributed data. In a traceability scheme a distributor broadcasts the encrypted data and gives each authorized user unique key an
РабоÑа поÑвÑÑена ÑазÑабоÑке плаÑÑоÑÐ¼Ñ Ð´Ð»Ñ ÑÐ¾Ð·Ð´Ð°Ð½Ð¸Ñ Ð¾Ð±ÑÑаÑÑÐ¸Ñ Ð¸Ð³Ñ. СиÑÑ
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::97907844bdfe86ddeb50d0f6fe6e17e4
Autor:
Dragos-Paul POP
Publikováno v:
Database Systems Journal, Vol II, Iss 2, Pp 55-63 (2011)
Choosing the primary key for a table proves to be one of the most important steps in database design. But what happens when we have to pick between a natural or a surrogate key? Is there any performance issue that we must have in mind? Does the liter
Externí odkaz:
https://doaj.org/article/41544eca4a024d82aef47c50f86c486f
Autor:
Holger Boche, Moritz Wiese
Publikováno v:
ISIT
We study security functions which can serve to establish semantic security for privacy amplification in secret key generation. The security functions are functional forms of mosaics of combinatorial designs, more precisely, of group divisible designs
Publikováno v:
Frontiers in Genetics, Vol 12 (2021)
Frontiers in Genetics
Frontiers in Genetics
In recent years, many computational models have been designed to detect essential proteins based on protein-protein interaction (PPI) networks. However, due to the incompleteness of PPI networks, the prediction accuracy of these models is still not s
Publikováno v:
Journal of Discrete Mathematical Sciences and Cryptography. 22:1435-1451
We know that the importance, need and utility of EHR (Electronic Health Record) system is increasing rapidly in the modern world. The developed countries like USA, Canada has adopted this s...
Publikováno v:
Studies in Educational Evaluation. 60:109-116
In this theoretical paper we describe and compare two forward-looking approaches to assessment, Formative assessment (FA) and Response to intervention (RTI). The purpose is to provide researchers and practitioners with insights that enable more infor
Publikováno v:
Future Generation Computer Systems. 92:357-373
The inherent immutability offered by Blockchains (BC) ensures resilience against modification or removal of the stored data. In large scale networks like the Internet of Things (IoT), however, this feature significantly increases BC storage size and
Autor:
Sihame Elhammani, Saadia Nemmaoui
Publikováno v:
Business Intelligence ISBN: 9783030765071
CBI
CBI
By the huge use of biometric identification and authentication systems, securing user’s images is one of the major recent researches topics. In this paper we aim to present a new approach which is based on detecting face in any picture (even with l
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a133c6a8328f58d6b03c1a264adcc8ee
https://doi.org/10.1007/978-3-030-76508-8_19
https://doi.org/10.1007/978-3-030-76508-8_19
Publikováno v:
Materials Today: Proceedings.
Nowadays, almost all software products are sold online. But there is a danger of unauthorized users using the product. For this reason, every company employs a product activation system where only authorized users that have a unique key called the pr