|
|
|
Yang Liu, Xiaotian Qi, Yingxia Wei and Mingna Wang
To mitigate the incidence of waterlogging to livelihoods and property security, a combination of management measures has been necessary to achieve optimal benefits, reducing the risk caused by waterlogging to the development of the urban ecology. Thus, t...
ver más
|
|
|
|
|
|
Zahra Ebadi Ansaroudi, Rocco Zaccagnino and Paolo D?Arco
Pseudorandomness is a crucial property that the designers of cryptographic primitives aim to achieve. It is also a key requirement in the calls for proposals of new primitives, as in the case of block ciphers. Therefore, the assessment of the property is...
ver más
|
|
|
|
|
|
Rafik Hamza and Hilmil Pradana
Big Data applications have the potential to transform any digital business platform by enabling the analysis of vast amounts of data. However, the biggest problem with Big Data is breaking down the intellectual property barriers to using that data, espec...
ver más
|
|
|
|
|
|
Jiafu Liu, Zhiyuan Yao, Shirui Guo, Hongjun Xie and Genke Yang
Image classification is widely used in industrial defect detection, medical diagnosis, social welfare, and other fields, in which privacy and security of models and data must be involved. For example, in diamond synthesis, the diamond substrate image ann...
ver más
|
|
|
|
|
|
Liliya Akhmetzyanova,Evgeny Alekseev,Alexandra Babueva,Andrey Bozhko,Stanislav Smyshlyaev
Pág. 6 - 14
We introduce a new AEAD mode ? an MGM2 mode. For this mode we provide security bounds regarding extended security notions in the nonce-misuse setting. Misuseresistance is crucial for applications for which there is no way to provide u...
ver más
|
|
|