搜索结果: 1-3 共查到“军事学 Process”相关记录3条 . 查询时间(0.094 秒)
qSCMS: Post-quantum certificate provisioning process for V2X
Vehicular communications (V2X) post-quantum security lattice-based cryptography
2019/1/4
Security and privacy are paramount in the field of intelligent transportation systems (ITS). This motivates many proposals aiming to create a Vehicular Public Key Infrastructure (VPKI) for managing ve...
Process Table Covert Channels: Exploitation and Countermeasures
Exploitation Countermeasures
2016/3/2
How to securely run untrusted software? A typical answer
is to try to isolate the actual effects this software might have. Such
counter-measures can take the form of memory segmentation, sandboxing
...
Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process
circular security fully homomorphic encryption LWE problem
2015/12/30
Fully homomorphic encryption (FHE) has important applications in cloud computing. However, almost all fully
homomorphic encryption schemes share two common flaws that they all use large-scale secret ...