>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Authority相关记录52条 . 查询时间(0.075 秒)
We propose a decentralized multi-authority anonymous authentication scheme in which a prover and a verifier are non-interactive. We give two security definitions; resistance against collusion attacks ...
In a (ciphertext policy) attribute-based encryption (ABE) scheme, a ciphertext is associated with a predicate ϕϕ and a secret key is associated with a string xx such that a key decrypts a ci...
In this work, we revisit multi-authority attribute based signatures (MA-ABS), and elaborate on the limitations of the current MA-ABS schemes to provide a hard to achieve (yet very useful) combination ...
This paper describes the development of geospatial-based disaster management system for an agency at regional level. Important aspects of the system such as spatial data, geospatial database, interfac...
This paper describes the development of geospatial-based disaster management system for an agency at regional level. Important aspects of the system such as spatial data, geospatial database, interfac...
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been proposed to implement fine-grained access control. Data owners encrypt data with a certain access policy so that only data users whose at...
Federal budget authority for research and development (R&D) rose in Fiscal Year (FY) 2016, the third straight year of current dollar increases, according to a new report from the National Ce...
Federal budget authority for research and development (R&D) rose in Fiscal Year (FY) 2016, the third straight year of current dollar increases, according to a new report from the National Ce...
Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms. In our proposal, a Multiple-Authorities Key-Policy Attribute-Based Encryption scheme is constructed in which the...
We propose an efficient large-universe multi-authority ciphertext-policy attribute-based encryption system. In a large-universe ABE scheme, any string can be used as an attribute of the system, and ...
As a sophisticated mechanism for secure fine-grained access control, ciphertext-policy attribute-based encryption (CP-ABE) is a highly promising solution for commercial applications such as cloud co...
This retrospective policy study identified how and why authority to confer Bachelor of Education degrees was extended to private colleges in Alberta. Data collection consisted of document review and i...
In this paper we address the problem of low-authority controller (LAC) design. The premise is that the actuators have limited authority, and hence cannot significantly shift the eigenvalues of the sys...
We prove that the simplest communication allowing two players to coordinate on a course of action is authority (letting one player choose an action). We also consider the case where each player poss...
We prove that the simplest communication allowing two players to coordinate on a course of action is authority (letting one player choose an action). We also consider the case where each player poss...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...