搜索结果: 1-7 共查到“军队指挥学 Markov”相关记录7条 . 查询时间(0.107 秒)
Complexity of Estimating Renyi Entropy of Markov Chains
information theory Renyi entropy Min-entropy
2019/7/8
Estimating entropy of random processes is one of the fundamental problems of machine learning and property testing. It has numerous applications to anything from DNA testing and predictability of huma...
Lattice Gaussian Sampling by Markov Chain Monte Carlo: Bounded Distance Decoding and Trapdoor Sampling
lattice Gaussian sampling Markov chain Monte Carlo bounded distance decoding
2019/6/5
Sampling from the lattice Gaussian distribution plays an important role in various research fields. In this paper, the Markov chain Monte Carlo (MCMC)-based sampling technique is advanced in several f...
MARKOV MODELING OF MOVING TARGET DEFENSE GAMES
Moving Target Defense Security Capacity Markov Models
2016/12/12
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework allows modeling of a broad range of MTD strategies, provides general theorems about how the probabil...
In order to remember long passwords, it is not uncommon users are recommended to create a sentence which then is assembled to form a long password, a passphrase. However, theoretically a language is v...
Attack On the Markov Problem
cryptanalysis non-commutative cryptography cryptographic protocols
2016/1/25
In 2000 Ko gave potential hard problem is proposed called the Markov
problem. We give an algorithm, for certain parameters, for solution of the
Markov problem. The Markov problem is related to the k...
Cryptanalysis of a Markov Chain Based User Authentication Scheme
Security Attacks Markov Chain Authentication Protocol
2015/12/29
Session key agreement protocol using smart card is extremely popular in clientserver
environment for secure communication. Remote user authentication protocol plays a
crucial role in our daily life ...
Standard Security Does Imply Security Against Selective Opening for Markov Distributions
Public-key encryption selective opening security Markov
2015/12/23
About three decades ago it was realized that implementing private channels between parties
which can be adaptively corrupted requires an encryption scheme that is secure against selective
opening at...