搜索结果: 1-9 共查到“军事学 history”相关记录9条 . 查询时间(0.125 秒)
Redactable Blockchain -- or -- Rewriting History in Bitcoin and Friends
Blockchain Bitcoin Chameleon hash functions
2016/12/10
We put forward a new framework that makes it possible to re-write and/or compress the content of any number of blocks in decentralized services exploiting the blockchain technology. As we argue, there...
More Practical and Secure History-Independent Hash Tables
DRE Secure History-Independent Hash Tables
2016/2/23
Direct-recording electronic (DRE) voting systems have been used in several countries including
United States, India, and the Netherlands to name a few. In the majority of those cases, researchers
di...
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence
oblivious RAM ORAM oblivious data structures
2015/12/21
We present a new oblivious RAM that supports variable-sized storage blocks (vORAM), which is
the first ORAM to allow varying block sizes without trivial padding. We also present a new historyindepend...
This year marks a century since the start of World War One and The University of Queensland and the Queensland Museum are staging a public symposium to explore the personal stories and experiences of ...
History-Free Sequential Aggregate Signatures
public-key cryptography / Aggregation Signature History-Freeness
2012/3/28
Aggregation schemes allow to combine several cryptographic values like message authentication codes or signatures into a shorter value such that, despite compression, some notion of unforgeability is ...
History-Free Sequential Aggregate Signatures
public-key cryptography / Aggregation Signature History-Freeness
2011/6/8
Aggregation schemes allow to combine several cryptographic values like message authentication codes or signatures into a shorter value such that, despite compression, some notion of unforgeability is ...
A Brief History of Provably-Secure Public-Key Encryption
Brief History Provably-Secure Public-Key Encryption
2009/6/12
Public-key encryption schemes are a useful and interesting
field of cryptographic study. The ultimate goal for the cryptographer in
the field of public-key encryption would be the production of a ve...
History-Independent Cuckoo Hashing
History-Independent Cuckoo Hashing dynamic dictionary Cuckoo Hashing
2009/6/5
In this work we construct a practical history-independent dynamic dictionary based on cuckoo
hashing. In a history-independent data structure, the memory representation at any point in
time yields n...
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories
Deterministic History-Independent Strategies for Storing Information Write-Once Memories
2008/9/3
Motivated by the challenging task of designing \secure" vote storage mechanisms, we deal
with information storage mechanisms that operate in extremely hostile environments. In such
environments, the...