工学 >>> 力学 农业工程 林业工程 工程与技术科学基础学科 测绘科学技术 材料科学 矿山工程技术 石油与天然气工程 冶金工程技术 机械工程 光学工程 仪器科学与技术 动力与电气工程 能源科学技术 核科学技术 电子科学与技术 信息与通信工程 控制科学与技术 计算机科学技术 化学工程 纺织科学技术 印刷工业 服装工业、制鞋工业 轻工技术与工程 食品科学技术 土木建筑工程 水利工程 交通运输工程 船舶与海洋工程 航空、航天科学技术 兵器科学与技术 环境科学技术 安全科学技术 工业设计
搜索结果: 1-15 共查到工学 SECURE相关记录45条 . 查询时间(0.144 秒)
哈尔滨工程大学计算机科学与技术学院网络技术与信息安全教学与研究中心师生的研究论文《Anchor Link Prediction for Privacy Leakage via De-Anonymization in Multiple Social Networks》日前被网络与信息安全领域顶级期刊IEEE Transactions on Dependable and Secure Computin...
Michael Short came to MIT in the fall of 2001 as an 18-year-old first-year who grew up in Boston’s North Shore. He immediately felt at home, so much so that he’s never really left. It’s not that Short...
Additive manufacturing, also known as 3-D printing, is replacing conventional fabrication processes in critical areas ranging from aerospace components to medical implants. But because the process rel...
No two people are believed to have identical fingerprints, but researchers at the New York University Tandon School of Engineering and Michigan State University College of Engineering have found that ...
As computer systems become increasingly large and complex, their Dependability, Security and Autonomy play critical role at supporting next-generation science, engineering, and commercial applications...
The Cyber-Physical Systems (CPS) present unprecedented opportunities for society progressively moving towards a socio-technical ecosystem. Big data collected from numerous CPS, connected via the advan...
To advance the technology necessary for secure communication, the National Science Foundation (NSF) has awarded $12 million to develop systems that use photons in pre-determined quantum states as a wa...
The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation.Barthe, D’Argenio, and Rezk coined the term “self-composition...
Secure computation (SC) stands for a group of technologies for computing functions of private inputs, while keeping the inputs themselves hidden. The canonical example of secure computation is the m...
The digital world once existed largely in non-material form. But with the rise of connected homes, smart grids and autonomous vehicles, the cyber and the physical are merging in new and exciting ways....
We present a new class of signature schemes based on properties of certain bilinear algebraic maps. These signatures are secure against existential forgery under a chosen message attack in the standar...
Recently, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure encryption from identity-based encryption in the standard model. We improve the efficiency of their construction...
We present a fully secure Identity Based Encryption scheme whose proof of security does not rely on the random oracle heuristic. Security is based on the Decision Bilinear Diffie-Hellman assumption. T...
We describe a public-key encryption system that remains secure even encrypting messages that depend on the secret keys in use. In particular, it remains secure under a ``key cycle'' usage, where we ha...
We initiate the study of quantum-secure digital signatures and quantum chosen ciphertext security. In the case of signatures, we enhance the standard chosen message query model by allowing the adver...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...