COW
发表于 2025-3-23 13:06:37
Threshold Signature Scheme with Strong Forward Security Based on Chinese Remainder Theorem on this, a threshold signature scheme with strong forward security based on Chinese remainder theorem is proposed. The signature is generated through the cooperation of members, which solve the problem of authoritative fraud introduced by the dealer. The private key is updated periodically to handl
袖章
发表于 2025-3-23 16:22:52
http://reply.papertrans.cn/87/8636/863518/863518_12.png
Isometric
发表于 2025-3-23 20:54:49
http://reply.papertrans.cn/87/8636/863518/863518_13.png
桶去微染
发表于 2025-3-24 00:32:24
Database Query System with Budget Option for Differential Privacy Against Repeated Attacksd against repeated attacks. This paper proposes a practical Database Query System for differential privacy protection against repeated attacks with customizable privacy budget. By limiting adversary’s success probability and the number of attacks, the administrator can protect privacy against the re
convert
发表于 2025-3-24 02:39:51
Research on Social Networks Publishing Method Under Differential Privacyta publishing algorithm named DP-HRG is proposed in the paper, which is based on Hierarchical Random Graph (HRG). Firstly, the social network is divided into 1-neighborhood subgraphs, and the HRG of each subgraph is extracted by using both Markov Monte Carlo (MCMC) and exponential mechanism to compo
阐释
发表于 2025-3-24 10:06:08
http://reply.papertrans.cn/87/8636/863518/863518_16.png
debase
发表于 2025-3-24 11:40:34
http://reply.papertrans.cn/87/8636/863518/863518_17.png
Heart-Rate
发表于 2025-3-24 17:19:53
http://reply.papertrans.cn/87/8636/863518/863518_18.png
happiness
发表于 2025-3-24 22:51:49
http://reply.papertrans.cn/87/8636/863518/863518_19.png
glucagon
发表于 2025-3-25 01:28:41
Security Assessment for Cascading Failures of Cyber-Physical Systems Under Target Attack Strategycause cascading failures and then in sharp contrast with the previous physical space. Thus, how to effectively evaluate the security of cyber-physical systems becomes critical. In this paper, we model the cyber-physical systems and then analyze the cascading failure process under target attack strat