نتایج جستجو برای: deniable authentication

تعداد نتایج: 35051  

2014
Bradley Hauer Ryan B. Hayward Grzegorz Kondrak

We propose a novel approach to deciphering short monoalphabetic ciphers that combines both character-level and word-level language models. We formulate decipherment as tree search, and use Monte Carlo Tree Search (MCTS) as a fast alternative to beam search. Our experiments show a significant improvement over the state of the art on a benchmark suite of short ciphers. Our approach can also handl...

Journal: :IACR Cryptology ePrint Archive 2009
Seiko Arita

It is known that composable secure commitments, that is, concurrent non-malleable commitments exist in the plain model, based only on standard assumptions such as the existence of claw-free permutations or even one-way functions. Since being based on the plain model, the deniability of them is trivially satisfied, and especially the latter scheme satisfies also adaptivity, hence it is adaptived...

H. Nasiraee M. Ashouri-Talouki,

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

Journal: :quran and medicine 0
reza ilkhani research deputy of traditional medicine, tehran university of medical sciences, tehran, ir iran; research deputy of traditional medicine, tehran university of medical sciences, tehran, ir iran. tel: +98-2133364238 zohreh ghazimoradi research deputy of traditional medicine, tehran university of medical sciences, tehran, ir iran

conclusions the current study showed that poorness and unreliability of “al-kafi” narratives is a vain thought. hence, it is recommended to perform clinical trial studies (at least) on accurate/authentic narratives, and also consider them as reputable and valid narratives, along with traditional medicine references. results from all narratives of the book “al-kafi” (pillars, furoo, and rouzat a...

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

Journal: :Philosophical transactions. Series A, Mathematical, physical, and engineering sciences 2008
Adam Greenfield

At a time when both the landscape of everyday life and the choices available to us there are increasingly conditioned by ubiquitous information processing systems, it seems wise to articulate some general principles guiding their ethical design and deployment. I here enunciate five broad guidelines for the designers of such systems, including recommendations that they be devised in such a way a...

2007
Garri Kasparov

In recent studies on emotions and computer games the experiential side of emotions is often left uncharted due to methodological constraints. Regarding a comprehensive understanding on computer games and emotions such ignorance is untenable. By basing its analysis on an experience already lived as an emotional playing experience, this paper examines emotions in play in regard to both their qual...

A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...

2014
Xingjie Yu Bo Chen Zhan Wang Bing Chang Wen Tao Zhu Jiwu Jing

Nowadays, smartphones have started being used as a tool to collect and spread politically sensitive or activism information. The exposure of the possession of such sensitive data shall pose a risk in severely threatening the life safety of the device owner. For instance, the data owner may be caught and coerced to give away the encryption keys so that the encryption alone is inadequate to mitig...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید