COW 发表于 2025-3-23 13:06:37
Threshold Signature Scheme with Strong Forward Security Based on Chinese Remainder Theorem on this, a threshold signature scheme with strong forward security based on Chinese remainder theorem is proposed. The signature is generated through the cooperation of members, which solve the problem of authoritative fraud introduced by the dealer. The private key is updated periodically to handl袖章 发表于 2025-3-23 16:22:52
http://reply.papertrans.cn/87/8636/863518/863518_12.pngIsometric 发表于 2025-3-23 20:54:49
http://reply.papertrans.cn/87/8636/863518/863518_13.png桶去微染 发表于 2025-3-24 00:32:24
Database Query System with Budget Option for Differential Privacy Against Repeated Attacksd against repeated attacks. This paper proposes a practical Database Query System for differential privacy protection against repeated attacks with customizable privacy budget. By limiting adversary’s success probability and the number of attacks, the administrator can protect privacy against the reconvert 发表于 2025-3-24 02:39:51
Research on Social Networks Publishing Method Under Differential Privacyta publishing algorithm named DP-HRG is proposed in the paper, which is based on Hierarchical Random Graph (HRG). Firstly, the social network is divided into 1-neighborhood subgraphs, and the HRG of each subgraph is extracted by using both Markov Monte Carlo (MCMC) and exponential mechanism to compo阐释 发表于 2025-3-24 10:06:08
http://reply.papertrans.cn/87/8636/863518/863518_16.pngdebase 发表于 2025-3-24 11:40:34
http://reply.papertrans.cn/87/8636/863518/863518_17.pngHeart-Rate 发表于 2025-3-24 17:19:53
http://reply.papertrans.cn/87/8636/863518/863518_18.pnghappiness 发表于 2025-3-24 22:51:49
http://reply.papertrans.cn/87/8636/863518/863518_19.pngglucagon 发表于 2025-3-25 01:28:41
Security Assessment for Cascading Failures of Cyber-Physical Systems Under Target Attack Strategycause cascading failures and then in sharp contrast with the previous physical space. Thus, how to effectively evaluate the security of cyber-physical systems becomes critical. In this paper, we model the cyber-physical systems and then analyze the cascading failure process under target attack strat