نتایج جستجو برای: encrypted database
تعداد نتایج: 273905 فیلتر نتایج به سال:
java is an object-oriented program that has abundant open-source libraries for application development and 3d model rendering. spatial database is the database that can efficiently store and manage geographic information data though various spatial data management techniques. this paper explores the rationale of coupling java with spatial database to develop an effective platform for future bui...
1 Water Resources Unit, Institute for Environment and Sustainability, Joint Research Centre, Ispra, Italy 2 Institut de Recherche pour le Développement, UMR EME 212, Centre de Recherche Halieutique Méditerranéenne et Tropicale, Sète, France 3 Ecopath International Initiative Research Association, Barcelona, Spain 4 Unité de Recherche Ecosystèmes et Ressources Aquatiques UR03AGRO1, Institut Nati...
In this paper, RSA algorithm is used to encrypt the secret message and advanced LSB technique is used to hide the encrypted message. Firstly, the message is encrypted and then encrypted message is being divided in two parts. First part of the encrypted message is xored with odd position and second part with even position of LSB+1. After that the xored encrypted message is being hidden on LSB po...
The present conditions of classroom instruction to numbers of children still too large to be adequately handled, makes it nearly inevitable that the problem of educafor teachers of backward children should become largely a question of measuring abilities, testing attainments and organising children into more homogeneous grades; and within those grades, diagnosing and treating by individual meth...
To analyze the consequences of new technologies, which make it possible to employ distant labour, we model a developed country with high and medium-skilled labour interacting with an emerging market economy (EME) with medium and low-skilled labour. Expansion in labour supply induces medium-skill biased technical change, which raises the demand for such labour. As a result, inequalities tend to ...
Although end-to-end encrypted email as been accessible for many years, it has yet to see ubiquitous uptake by the general public. In an effort to determine why this is the case, encrypted email schemes, PGP and S/MIME have been studied. Although they meet the requirements of sending an encrypted email, they fail to meet some requirements that are needed to make the use of end-to-end encrypted e...
With the development of smart city, user data are all transformed in encrypted form to protect user privacy. Secure comparison in encrypted form is the fundamental operation of many secure encrypted data analysis tasks, such as secure k-NN query and classification, Bayesian classification. Thus, it is important to achieve an efficient secure encrypted data comparison scheme. Recently, some meth...
This thesis considers the possibilities of secure outsourcing of databases and of content-based routing operations to an untrusted service provider. We explore the limits of the security that is achievable in these scenarios. When discussing security, we refer to the state of the art definitions from cryptography and complexity theory. The key contributions of the thesis are the following: We e...
How to embed and/or extract watermarks on encrypted images without being able to decrypt is a challenging problem. In this paper, we firstly discuss the implementation of Walsh-Hadamard transform (WHT) and its fast algorithm in the encrypted domain, which is particularly suitable for the applications in the encrypted domain for its transform matrix consists of only integers. Then by modifying t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید