搜索结果: 1-8 共查到“军事学 Policies”相关记录8条 . 查询时间(0.093 秒)
An Analysis of Acceptance Policies For Blockchain Transactions
Acceptance Policies Blockchain Transactions
2018/1/11
The standard acceptance policy for a cryptocurrency transaction at most exchanges is to wait until the transaction is placed in the blockchain and followed by a certain number of blocks. However, as n...
Access Control Encryption for General Policies from Standard Assumptions
access control encryption functional encryption information flow control
2017/5/31
Functional encryption enables fine-grained access to encrypted data. In many scenarios, however, it is important to control not only what users are allowed to read (as provided by traditional function...
Attribute-based methods provide authorization to parties based on whether their set of
attributes (e.g., age, organization, etc.) fulfills a policy. In attribute-based encryption (ABE),
authorized p...
Analysis of Key Wrapping APIs: Generic Policies, Computational Security
key management key wrapping cryptographic APIs
2016/5/3
We present an analysis of key wrapping APIs with
generic policies. We prove that certain minimal conditions on
policies are sufficient for keys to be indistinguishable from
random in any execution ...
The Emperor's New Password Creation Policies
User authentication Password creation policy Password cracking
2015/12/23
While much has changed in Internet security over the past
decades, textual passwords remain as the dominant method to secure
user web accounts and they are proliferating in nearly every new web
ser...
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
cryptographic protocols / authorized private set intersection multiple authorities rich
2012/3/26
Companies, organizations, and individuals often wish to share information to realize valuable social and economic goals. Unfortunately, privacy concerns often stand in the way of such information shar...
Concealing Complex Policies with Hidden Credentials
Concealing Complex Policies Hidden Credentials
2009/3/26
Hidden credentials are useful in protecting sensitive resource requests, resources, policies and credentials.We propose a significant improvement in decryption performance when implementing hidden cre...
Naval Strategy in Northeast Asia: Geo-strategic Goals, Policies, and Prospects
Naval Strategy Northeast Asia Geo-strategic Goals Policies Prospects
2009/3/13
The end of the Cold War, which essentially meant the end of the United States and Soviet Union confrontation, has brought an unpredictable international order. This transformation has caused a change...