找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Theoretic Security; 10th International C Junji Shikata Conference proceedings 2017 Springer International Publishing AG 2017 Au

[复制链接]
楼主: 不正常
发表于 2025-3-25 04:33:37 | 显示全部楼层
,Catching MPC Cheaters: Identification and Openability, with three new properties to discourage cheating. First is a strengthening of ., called . identifiable abort, where all parties who do not follow the protocol will be identified as cheaters by each honest party. The second is ., which means that a third party can determine whether the computation w
发表于 2025-3-25 11:32:16 | 显示全部楼层
发表于 2025-3-25 12:03:43 | 显示全部楼层
Four Cards Are Sufficient for a Card-Based Three-Input Voting Protocol Utilizing Private Permutatiocards. In existing card-based cryptographic protocols, a special operation of cards called a . is used to achieve the information-theoretic security. Recently, card-based cryptographic protocols have been reconsidered from the viewpoint of multi-party computations. In this direction, a new model of
发表于 2025-3-25 18:58:53 | 显示全部楼层
发表于 2025-3-25 23:41:53 | 显示全部楼层
Secure Network Coding for Multiple Unicast: On the Case of Single Source, destinations. The primal goal is to characterize the secure capacity region, where the exchanged messages have to be secured from a passive external eavesdropper that has unbounded computational capabilities, but limited network presence. The secure capacity region for the case of two destinations
发表于 2025-3-26 03:06:29 | 显示全部楼层
,Rényi Resolvability and Its Applications to the Wiretap Channel,istribution of a channel in either the total variation distance or the relative entropy. In this paper, we use the (normalized or unnormalized) Rényi divergence (with the Rényi parameter in [0,2]) to measure the level of approximation. We also provide asymptotic expressions for normalized Rényi dive
发表于 2025-3-26 05:31:02 | 显示全部楼层
978-3-319-72088-3Springer International Publishing AG 2017
发表于 2025-3-26 10:09:52 | 显示全部楼层
Information Theoretic Security978-3-319-72089-0Series ISSN 0302-9743 Series E-ISSN 1611-3349
发表于 2025-3-26 14:12:55 | 显示全部楼层
https://doi.org/10.1007/978-3-319-72089-0Authentication codes; Adversarial channel models; Biometric security; Bounded storage models; Informatio
发表于 2025-3-26 19:27:12 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-20 09:27
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表