|
|
|
Zitong Wang, Enrang Zheng, Jianguo Liu and Tuo Guo
Traditional methods of orthogonal basis function decomposition have been extensively used to detect magnetic anomaly signals. However, the determination of the relative velocity between the detection platform and the magnetic target remains elusive in pr...
ver más
|
|
|
|
|
|
|
Razan Nayef Almashaqbeh, Hashem Alshurafat and Hamzeh Al Amosh
This study aims to provide an understanding of the impact of professionalism theory constructs on the applicability of forensic accounting services, as well as reviewing the obstacles to implementing the profession of forensic accounting through a litera...
ver más
|
|
|
|
|
|
|
Huifeng Fan, Ruwei Huang and Fengting Luo
Aiming at the problem that the fully homomorphic encryption scheme based on single identity cannot satisfy the homomorphic operation of ciphertext under different identities, as well as the inefficiency of trapdoor function and the complexity of sampling...
ver más
|
|
|
|
|
|
|
Shinji Ono, Jun Takata, Masaharu Kataoka, Tomohiro I, Kilho Shin and Hiroshi Sakamoto
For the feature selection problem, we propose an efficient privacy-preserving algorithm. Let D, F, and C be data, feature, and class sets, respectively, where the feature value ??(????)
x
(
F
i
)
and the class label ??(??)
x
(
C
)
are given for each ??...
ver más
|
|
|
|
|
|
|
Najah Mary El-Gharib and Daniel Amyot
Process mining (PM) exploits event logs to obtain meaningful information about the processes that produced them. As the number of applications developed on cloud infrastructures is increasing, it becomes important to study and discover their underlying p...
ver más
|
|
|
|
|
|
|
Yan Wang, Yi Zhang, Hengchao Zhao and Hongbo Wang
A ship collision risk assessment model is an essential part of ship safety navigation. At present, the open water collision risk assessment model (such as the closest point of approach) is applied, but a ship collision risk model suitable for inland rive...
ver más
|
|
|
|
|
|
|
Humberto Mata-Alejandro, Erick Arturo Betanzo-Torres, Gabycarmen Navarrete-Rodriguez and Maria Del Refugio Castañeda-Chavez
The objective of this work is to show the population structure of V. tiliifolia under natural conditions. The study was conducted in three municipalities in the state of Veracruz, México; through transects of 20 × 100 m (2000 m2), the population structur...
ver más
|
|
|
|
|
|
|
Liliya Akhmetzyanova,Evgeny Alekseev,Alexandra Babueva,Andrey Bozhko,Stanislav Smyshlyaev
Pág. 6 - 14
We introduce a new AEAD mode ? an MGM2 mode. For this mode we provide security bounds regarding extended security notions in the nonce-misuse setting. Misuseresistance is crucial for applications for which there is no way to provide u...
ver más
|
|
|
|
|
|
|
Liliya Akhmetzyanova
Pág. 1 - 9
In this paper the security of AEAD mode called the Multilinear Galois Mode (MGM) was analyzed regarding confidentiality property. This mode was originally proposed in CTCrypt 2017. Then it was adopted as a standard AEAD mode in the Ru...
ver más
|
|
|
|
|
|
|
Luis Parrilla, Antonio García, Encarnación Castillo, Salvador Rodríguez-Bolívar and Juan Antonio López-Villanueva
Power noise generation for masking power traces is a powerful countermeasure against Simple Power Analysis (SPA), and it has also been used against Differential Power Analysis (DPA) or Correlation Power Analysis (CPA) in the case of cryptographic circuit...
ver más
|
|
|
|