exercise 发表于 2025-3-28 15:27:39

Privacy-Preserving ,-Nearest Neighbour Query on Outsourced Database data structure called .d-tree to achieve sublinear query complexity. In order to protect data access patterns, garbled circuits are used to simulate Oblivious RAM (ORAM) for accessing data in the .d-tree. Compared to the existing solutions, our scheme imposes little overhead on both the data owner and the querying client.

Ossification 发表于 2025-3-28 21:13:10

http://reply.papertrans.cn/47/4655/465403/465403_42.png

Wernickes-area 发表于 2025-3-29 01:56:01

http://reply.papertrans.cn/47/4655/465403/465403_43.png

流浪者 发表于 2025-3-29 06:50:16

http://reply.papertrans.cn/47/4655/465403/465403_44.png

Noisome 发表于 2025-3-29 09:37:41

A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Gridsormation from smart meters would be used to perform a state estimation in real time in order to maintain the stability of the system. A wrong estimation can lead to diastrous consequences (e.g. suspension of electricity supply or a big financial loss). Unfortunately, quite a number of recent results

保守党 发表于 2025-3-29 11:33:20

http://reply.papertrans.cn/47/4655/465403/465403_46.png

Malfunction 发表于 2025-3-29 19:00:56

http://reply.papertrans.cn/47/4655/465403/465403_47.png

Retrieval 发表于 2025-3-29 21:55:13

http://reply.papertrans.cn/47/4655/465403/465403_48.png

同时发生 发表于 2025-3-30 01:34:12

http://reply.papertrans.cn/47/4655/465403/465403_49.png

宿醉 发表于 2025-3-30 06:39:19

On the Guessability of Resident Registration Numbers in South Koreas are required to enter their Resident Registration Number (RRN) to identify themselves. We adapt guessing theory techniques to measure RRN security against a trawling attacker attempting to guess victim’s RRN using some personal information (such as name, sex, and location) that are publicly availa
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Information Security and Privacy; 21st Australasian Co Joseph K. Liu,Ron Steinfeld Conference proceedings 2016 Springer International Publi