变形 发表于 2025-3-30 09:21:33

http://reply.papertrans.cn/47/4640/463911/463911_51.png

misshapen 发表于 2025-3-30 15:30:48

http://reply.papertrans.cn/47/4640/463911/463911_52.png

minaret 发表于 2025-3-30 20:36:33

http://reply.papertrans.cn/47/4640/463911/463911_53.png

祸害隐伏 发表于 2025-3-31 00:19:22

http://reply.papertrans.cn/47/4640/463911/463911_54.png

白杨鱼 发表于 2025-3-31 04:07:10

http://reply.papertrans.cn/47/4640/463911/463911_55.png

Pigeon 发表于 2025-3-31 06:01:00

Peter Flach,Nicolas Lachichehe data structures. In this work, we present and analyze an efficient hash table data structure that simultaneously achieves the following properties:.To our knowledge, our hash table construction is the first data structure that combines history-independence and protection against a form of timing

幻想 发表于 2025-3-31 09:38:19

http://reply.papertrans.cn/47/4640/463911/463911_57.png

黄瓜 发表于 2025-3-31 17:13:24

J. Hernández-Orallo,M. J. Ramírez-Quintanae security properties. We consider two classes of security goals: those involving security against a malicious logger attempting to present different views of the log to different parties or at different points in time, and those involving security against malicious monitors who attempt to frame an

enfeeble 发表于 2025-3-31 19:26:59

Tamás Horváth,Zoltán Alexin,Tibor Gyimóthy,Stefan Wrobelervices) through the use of an authenticated data structure named Balloon. Finally, our publicly available prototype implementation shows greatly improved performance with respect to related work and competitive performance for more data-intensive settings like secure logging.

我悲伤 发表于 2025-4-1 01:08:35

http://reply.papertrans.cn/47/4640/463911/463911_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Inductive Logic Programming; 9th International Wo Sašo Džeroski,Peter Flach Conference proceedings 1999 Springer-Verlag Berlin Heidelberg 1