نتایج جستجو برای: rate equivocation
تعداد نتایج: 960563 فیلتر نتایج به سال:
Today’s social networking services require users to trust the service provider with the confidentiality and integrity of their data. But with their history of data leaks and privacy controversies, these services are not always deserving of this trust. Indeed, a malicious provider could not only violate users’ privacy, it could equivocate and show different users divergent views of the system’s ...
We study a special case of Willems’s two-user multiaccess channel with partially cooperating encoders from security perspective. This model differs from Willems’s setup in that only one encoder, Encoder 1, is allowed to conference, Encoder 2 does not transmit any message, and there is an additional passive eavesdropper from whom the communication should be kept secret. For the discrete memoryle...
Recently, ε-almost dual universal2 hash functions has been proposed as a new and wider class of hash functions. This class well works even when the random seeds of hash function are subject to non-uniform distribution. This paper evaluates the security performance when we apply this kind of hash functions. We evaluate the security in several kinds of setting based on the L1 distinguishability c...
In this paper, we propose parallel heuristic methods to accelerate the generation of $(n,m)$ best equivocation code (BEC), where notation="LaTeX">$n$ and notation="LaTeX">$m$ are message lengths, respectively. The proposed dynamic pro...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید