搜索结果: 1-15 共查到“工学 SECURE”相关记录45条 . 查询时间(0.144 秒)
哈尔滨工程大学计算机科学与技术学院教师在网络与信息安全领域顶级国际期刊IEEE Transactions on Dependable and Secure Computing发表论文(图)
信息安全 IEEE Transactions on Dependable and Secure Computing 社交网络 隐私
2024/8/1
Print No Evil:Three-Layer Technique Helps Secure Additive Manufacturing(图)
Print No Evil Three-Layer Technique Secure Additive Manufacturing
2017/9/5
Additive manufacturing, also known as 3-D printing, is replacing conventional fabrication processes in critical areas ranging from aerospace components to medical implants. But because the process rel...
SO YOU THINK YOU CAN SECURE YOUR MOBILE PHONE WITH A FINGERPRINT?
SECURE YOUR MOBILE PHONE FINGERPRINT
2017/4/27
No two people are believed to have identical fingerprints, but researchers at the New York University Tandon School of Engineering and Michigan State University College of Engineering have found that ...
第15届IEEE国际可靠,自动和安全计算会议(15th IEEE International Conference on Dependable, Autonomic and Secure Computing)
第15届 IEEE 国际可靠 自动 安全计算 会议
2017/4/1
As computer systems become increasingly large and complex, their Dependability, Security and Autonomy play critical role at supporting next-generation science, engineering, and commercial applications...
第一届IEEE国际下一代网络安全智能社会研讨会(The 1st IEEE International Workshop on Secure Smart Society in Next Generation Networks)
第一届 IEEE 国际 下一代网络安全智能社会 研讨会
2017/3/30
The Cyber-Physical Systems (CPS) present unprecedented opportunities for society progressively moving towards a socio-technical ecosystem. Big data collected from numerous CPS, connected via the advan...
NSF invests $12 million in quantum technologies for secure communication
NSF $12 million quantum technologies secure communication
2016/8/11
To advance the technology necessary for secure communication, the National Science Foundation (NSF) has awarded $12 million to develop systems that use photons in pre-determined quantum states as a wa...
The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation.Barthe, D’Argenio, and Rezk coined the term “self-composition...
Maturity and Performance of Programmable Secure Computation
secure computation Performance
2015/12/22
Secure computation (SC) stands for a group of technologies for computing functions
of private inputs, while keeping the inputs themselves hidden. The canonical
example of secure computation is the m...
A partnership to secure and protect the emerging Internet of Things
protect the emerging Internet Things
2015/9/8
The digital world once existed largely in non-material form. But with the rise of connected homes, smart grids and autonomous vehicles, the cyber and the physical are merging in new and exciting ways....
We present a new class of signature schemes based on properties of certain bilinear algebraic maps. These signatures are secure against existential forgery under a chosen message attack in the standar...
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption
Cryptosystems Built Identity Based Encryption
2015/8/5
Recently, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure encryption from identity-based encryption in the standard model. We improve the efficiency of their construction...
We present a fully secure Identity Based Encryption scheme whose proof of security does not rely on the random oracle heuristic. Security is based on the Decision Bilinear Diffie-Hellman assumption. T...
Circular-Secure Encryption from Decision Diffie-Hellman
Decision Diffie-Hellman Circular-Secure Encryption
2015/8/5
We describe a public-key encryption system that remains secure even encrypting messages that depend on the secret keys in use. In particular, it remains secure under a ``key cycle'' usage, where we ha...
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
Secure Signatures Chosen Ciphertext Security
2015/8/5
We initiate the study of quantum-secure digital signatures and quantum chosen ciphertext
security. In the case of signatures, we enhance the standard chosen message query model
by allowing the adver...