军事学 >>> 军事学
搜索结果: 1-6 共查到军事学 time-stamping相关记录6条 . 查询时间(0.319 秒)
Commonly used digital signature schemes have a limited lifetime because their security is based on computational assumptions that will potentially break in the future when more powerful computers are ...
We construct a non-interactive scheme for proving computational work in the Random Oracle Model. Given a uniformly random ``puzzle'' $P <- {0,1}^n$ (where $n$ is the security parameter), a correspondi...
Skewed trees constitute a two-parameter family of recursively constructed trees. Recently, Willemson proved that suitably picked skewed trees are space-optimal for interval time-stamping. At the sam...
We present a universally composable time-stamping scheme based on universal one-way hash functions.The model we use contains an ideal auditing functionality (implementable in the Common Reference Str...
Time-stamping protocols, which assure that a document was existed at a certain time, are applied to some useful and practical applications such as electronic patent applications and so on. There are...
We prove in a non-black-box way that every bounded list and set commitment scheme is knowledge-binding. This is a new and rather strong security condition, which makes the security definitions for t...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...