نتایج جستجو برای: remainder preservation
تعداد نتایج: 88770 فیلتر نتایج به سال:
The hierarchical access control scheme based on Chinese Reminder Theorem [49] (CRTHACS) was supposed to be capable of hiding hierarchical structure, but Geiselmann et al. [18] showed practical attacks on CRTHACS to reveal the hierarchies it hides. Then, Zou et al. modified it, and gave a new CRTHACS [50] to resist those attacks. Nevertheless, we find that the modified version is still defective...
Data is generated over time by each device in the Internet of Things (IoT) ecosphere. Recent years have seen a resurgence interest IoT due to its positive impact on society. However, automatic management devices, possibility disclosing sensitive information without user consent high. A situation which should not be unintentionally disclosed outside parties we do trust, i.e., privacy-preservatio...
Chinese Remainder Theorem (CRT) has been widely studied with its applications in frequency estimation, phase unwrapping, coding theory and distributed data storage. Since traditional CRT is greatly sensitive to the errors in residues due to noises, the problem of robustly reconstructing integers via the erroneous residues has been intensively studied in the literature. In order to robustly reco...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید