COW 发表于 2025-3-23 13:06:37

Threshold Signature Scheme with Strong Forward Security Based on Chinese Remainder Theorem on this, a threshold signature scheme with strong forward security based on Chinese remainder theorem is proposed. The signature is generated through the cooperation of members, which solve the problem of authoritative fraud introduced by the dealer. The private key is updated periodically to handl

袖章 发表于 2025-3-23 16:22:52

http://reply.papertrans.cn/87/8636/863518/863518_12.png

Isometric 发表于 2025-3-23 20:54:49

http://reply.papertrans.cn/87/8636/863518/863518_13.png

桶去微染 发表于 2025-3-24 00:32:24

Database Query System with Budget Option for Differential Privacy Against Repeated Attacksd against repeated attacks. This paper proposes a practical Database Query System for differential privacy protection against repeated attacks with customizable privacy budget. By limiting adversary’s success probability and the number of attacks, the administrator can protect privacy against the re

convert 发表于 2025-3-24 02:39:51

Research on Social Networks Publishing Method Under Differential Privacyta publishing algorithm named DP-HRG is proposed in the paper, which is based on Hierarchical Random Graph (HRG). Firstly, the social network is divided into 1-neighborhood subgraphs, and the HRG of each subgraph is extracted by using both Markov Monte Carlo (MCMC) and exponential mechanism to compo

阐释 发表于 2025-3-24 10:06:08

http://reply.papertrans.cn/87/8636/863518/863518_16.png

debase 发表于 2025-3-24 11:40:34

http://reply.papertrans.cn/87/8636/863518/863518_17.png

Heart-Rate 发表于 2025-3-24 17:19:53

http://reply.papertrans.cn/87/8636/863518/863518_18.png

happiness 发表于 2025-3-24 22:51:49

http://reply.papertrans.cn/87/8636/863518/863518_19.png

glucagon 发表于 2025-3-25 01:28:41

Security Assessment for Cascading Failures of Cyber-Physical Systems Under Target Attack Strategycause cascading failures and then in sharp contrast with the previous physical space. Thus, how to effectively evaluate the security of cyber-physical systems becomes critical. In this paper, we model the cyber-physical systems and then analyze the cascading failure process under target attack strat
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Security and Privacy in New Computing Environments; Second EAI Internati Jin Li,Zheli Liu,Hao Peng Conference proceedings 2019 ICST Institu