搜索结果: 1-15 共查到“possession”相关记录18条 . 查询时间(0.037 秒)
A Processing Advantage for Inalienable Possession: Evidence from English Phrase Plausibility Judgments
coercion inalienable possession phrase interpretation plausibility judgments possession pragmatic inference relational nouns
2019/10/10
Possessive constructions encode a relation between two entities, the possessor and the possessum. For inalienable possession the relation encoded reflects a close, intrinsic connection between the pos...
A Generic Dynamic Provable Data Possession Framework
Secure Data Outsourcing Dynamic Provable Data Possession (DPDP), Authenticated Data Structures
2016/12/12
Ateniese et al. introduced the Provable Data Possession (PDP) model in 2007. Following that, Erway et al. adapted the model for dynamically updatable data, and called it the Dynamic Provable Data Poss...
A Multi-Function Provable Data Possession Scheme in Cloud Computing
multi-function provable data possession cloud computing
2016/1/8
In order to satisfy the different requirements of provable data possession in cloud
computing, a multi-function provable data possession (MF-PDP) is proposed, which supports
public verification, dat...
Efficient Dynamic Provable Data Possession Protocols with Public
Provable Data Possession Dynamcity Public Verifiability
2015/12/29
An efficient Dynamic Provable Data Possession scheme with Public Verifiability and Data
Privacy was recently published in ACISP’15. It appears that three attacks menace this
scheme. The first one en...
Possession Versus Position: Strategic Evaluation in AFL
Notational analysis Australian Rules Football tactical coaching
2015/3/23
In sports like Australian Rules football and soccer, teams must battle to achieve possession of the ball in sufficient space to make optimal use of it. Ultimately the teams need to score, and to do th...
Proofs of Data Possession and Retrievability Based on MRD Codes
data integrity dependable storage
2014/3/5
Proofs of Data Possession (PoDP) scheme is essential to data outsourcing. It provides an efficient audit to convince a client that his/her file is available at the storage server, ready for retrieval ...
FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession
authenticated dictionary provable data possession
2014/3/7
With popularity of cloud storage, efficiently proving the integrity of data stored at an untrusted server has become significant. Authenticated Skip Lists and Rank-based Authenticated Skip Lists (RBAS...
Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves
Provable data possession proofs of retrievability
2014/3/12
When outsourcing large sets of data to the cloud, it is desirable for clients to efficiently check, whether all outsourced data is still retrievable at any later point in time without requiring to dow...
Transparent, Distributed, and Replicated Dynamic Provable Data Possession
Secure cloud storage provable data possession
2014/3/13
With the growing trend toward using outsourced storage, the problem of efficiently checking and proving data integrity needs more consideration. Starting with PDP and POR schemes in 2007, many cryptog...
Towards Efficient Provable Data Possession
cryptographic protocols / Cloud Storage, Provable Data Possession, Proofs of Retrievability Remote Data Integrity Check Homomorphic Authentication Tag RSA Factorization Problem
2012/3/21
Provable Data Possession (\PDP) allows data owner to periodically and remotely audit their data stored in a cloud storage, without retrieving the file and without keeping a local copy. Ateniese~\emph{...
Towards Efficient Provable Data Possession
cryptographic protocols / Cloud Storage Provable Data Possession Proofs of Retrievability Remote Data Integrity Check Homomorphic Authentication Tag RSA Factorization Problem
2012/3/23
Provable Data Possession (\PDP) allows data owner to periodically and remotely audit their data stored in a cloud storage, without retrieving the file and without keeping a local copy. Ateniese~\emph{...
Towards Efficient Provable Data Possession
cryptographic protocols / Cloud Storage Provable Data Possession Proofs of Retrievability Remote Data Integrity Check Homomorphic Authentication Tag RSA Factorization Problem
2012/3/23
Provable Data Possession (\PDP) allows data owner to periodically and remotely audit their data stored in a cloud storage, without retrieving the file and without keeping a local copy. Ateniese~\emph{...
Towards Efficient Provable Data Possession
public-key cryptography / Public key cryptosystem Error-correcting code Code based PKC Cyclic code Multivariate PKC Gr鯾 ner bases Rank attack PQC.
2012/3/23
In this paper, we present a new class of multivariate public-key cryptosystems, K(XIII)SE(2)PKC realizing the coding rate of exactly 1.0, based on random pseudo cyclic codes. The K(XIII)SE(2)PKC is co...
As online storage-outsourcing services (e.g., Amazon’s S3) and resource-sharing networks
(e.g., peer-to-peer and grid networks) became popular, the problem of efficiently proving the
integrity of da...
Scalable and Efficient Provable Data Possession
block modification Provable Data Possession PDP
2009/6/3
Storage outsourcing is a rising trend which prompts a
number of interesting security issues, many of which
have been extensively investigated in the past. However,
Provable Data Possession (PDP) is...