نتایج جستجو برای: authenticated

تعداد نتایج: 4119  

Journal: :DEStech Transactions on Computer Science and Engineering 2017

Journal: :Security and Communication Networks 2017

Journal: :International Journal of Pure and Apllied Mathematics 2013

Journal: :ACM Transactions on Information and System Security 2007

Jalali , Mohsen , Pourahmadi , Elnaz , Zamani , Majid ,

Background and Objective: Childhood behavioral and emotional problems may be continus to puberty, even extend to elderly. This study was carried out to determine the role of family accommodation of child symptoms, parenting style and parental stress in prediction of anxiety disorder in children with 6 - 10 years old in Golestan province, north of Iran. Methods: In this descriptive-analytic stu...

2012
Rosario Gennaro Daniel Wichs

We define and construct a new primitive called a fully homomorphic message authenticator. With such scheme, anybody can perform arbitrary computations over authenticated data and produce a short tag that authenticates the result of the computation (without knowing the secret key). This tag can be verified using the secret key to ensure that the claimed result is indeed the correct output of the...

2015
Dominique Schröder Mark Simkin

In a Verifiable Data Streaming (VDS) protocol a computationally weak client outsources his storage to an untrusted storage provider. Later, the client can efficiently append and update data elements in the already outsourced and authenticated data set. Other users can stream arbitrary subsets of the authenticated data and verify their integrity on-the-fly, using the data owner’s public verifica...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید