找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Data and Applications Security and Privacy XXVII; 27th Annual IFIP WG Lingyu Wang,Basit Shafiq Conference proceedings 2013 IFIP Internatio

[复制链接]
楼主: Forbidding
发表于 2025-3-30 08:36:27 | 显示全部楼层
Fair Private Set Intersection with a Semi-trusted Arbitertocol. The arbiter can resolve disputes without knowing any private information belongs to the two parties. This feature is appealing for a PSI protocol in which privacy may be of ultimate importance.
发表于 2025-3-30 15:34:18 | 显示全部楼层
Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databas .  schemes are very simple, non-interactive, and computation/communication efficient. Our generic scheme can be constructed from any aggregate signature coupled with a standard signature. Hence, it can flexibly provide performance trade-offs for various types of applications. Our specific scheme is
发表于 2025-3-30 20:05:53 | 显示全部楼层
Access Control and Query Verification for Untrusted Databases the data. Our solution ensures that a particular data item is read and modified by only those entities who have been authorized by the data owner to access that data item. It provides privacy against malicious entities that somehow get access to the data stored at the server. Our solutions allow ea
发表于 2025-3-31 00:00:41 | 显示全部楼层
Liang Feng Zhang,Reihaneh Safavi-Naini of ARBAC rules and users considered during analysis. We also present a number of parallel algorithms that speed up the analysis on multi-core systems. The experimental results show that our techniques significantly reduce the analysis time, making it practical to analyze ARBAC without separate admi
发表于 2025-3-31 03:53:46 | 显示全部楼层
发表于 2025-3-31 06:06:01 | 显示全部楼层
发表于 2025-3-31 10:10:40 | 显示全部楼层
发表于 2025-3-31 14:14:13 | 显示全部楼层
Computer Security – ESORICS 2016 the data. Our solution ensures that a particular data item is read and modified by only those entities who have been authorized by the data owner to access that data item. It provides privacy against malicious entities that somehow get access to the data stored at the server. Our solutions allow ea
发表于 2025-3-31 21:31:56 | 显示全部楼层
Using Safety Constraint for Transactional Dataset Anonymizationiple to ensure that correlated values are grouped together in unique partitions that enforce .-diversity at the level of individuals. We conduct a set of experiments to evaluate privacy breach and the anonymization cost of safe grouping.
发表于 2025-4-1 00:31:22 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-29 02:57
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表