搜索结果: 1-15 共查到“工学 identity”相关记录24条 . 查询时间(0.046 秒)
The Governance of Identity. Recording Values of Rural Heritage in Urban Areas
Cultural heritage surveying farming inventory urban planning understanding decision support
2015/11/11
This paper describes the use of a prototype application to read the value of rural heritage inserted in urban sprawl. Until last decades, rural settlements, as a place of perpetual work-shop rooted to...
Culture heritage and identity – some cases in Taiwan on the protection of cultural heritage
Cultural heritage identity Taiwan
2015/9/14
The protection of cultural heritage relates to an issue of identity. How a nation or a state tries to face to its history is often revealed
on the protection of cultural heritage. Taiwan is as a coun...
We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffi...
Chosen-Ciphertext Security from Identity-Based Encryption
Identity-Based Encryption Chosen-Ciphertext Security
2015/8/5
We propose simple and efficient "CCA-secure" public-key encryption schemes (i.e., schemes secure against adaptive chosen-ciphertext attacks) based on any identity-based encryption (IBE) scheme. When i...
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption
Cryptosystems Built Identity Based Encryption
2015/8/5
Recently, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure encryption from identity-based encryption in the standard model. We improve the efficiency of their construction...
We present a fully secure Identity Based Encryption scheme whose proof of security does not rely on the random oracle heuristic. Security is based on the Decision Bilinear Diffie-Hellman assumption. T...
Hierarchical Identity Based Encryption with Constant Size Ciphertext
Constant Size Ciphertext Based Encryption
2015/8/5
We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of just three group elements and decryption requires only two bilinear map computations, independent of ...
Efficient Selective Identity-Based Encryption Without Random Oracles
Random Oracles Identity-Based Encryption
2015/8/5
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model Selective identity secure IBE is a slightly weaker security model ...
Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) on elliptic curves. One exception is an elegant system due to Cocks which builds an IBE based on the...
World’s smallest spirals could guard against identity theft(图)
smallest spirals guard against identity theft
2015/6/18
Take gold spirals about the size of a dime…and shrink them down about six million times. The result is the world’s smallest continuous spirals: “nano-spirals” with unique optical properties that would...
Hybrid Radio Frequency and Video Framework for Identity-Aware Augmented Perception in Disaster Management and Assistive Technologies
augmented perception hybrid identification radio frequency tracking video
2014/11/7
In this dissertation, we introduce a hybrid radio frequency and video framework that enables identity aware-augmented perception. Identity-aware augmented perception enhances users' perception of the ...
Digital Identity and Privacy in some New-Generation Information and Communication Technologies
Digital Identity Privacy New-Generation Information Communication Technologies
2010/9/25
The use of the new information and communication technologies (ICT)has led to significant changes in the daily development of theinformation society. Although most of those changes tend to improve our...
A Privacy Preserving Attribute Aggregation Model for Federated Identity Managements
A Privacy Preserving Attribute Aggregation Model Federated Identity Managements
2010/9/25
In order to support attribute based access control (ABAC) infederated identity management most existing solutions, such asShibboleth and Cardspace, utilise a model in which a single identityprovider (...
SWIFT: Advanced Services for Identity Management
SWIFT Advanced Services Identity Management
2010/9/25
Traditional solutions for identity management, based on the end userauthentication, usually by means of credentials such as username andpassword, have significantly improved in recent years with thein...
Digital Identity and Identity Management Technologies
Digital Identity d Identity Management Technologies
2010/9/25
There are many technologies for identity management available in theform of open specifications, open source tools and commercialapplications. There are currently several standards competing in thefie...