搜索结果: 1-15 共查到“Integrity”相关记录153条 . 查询时间(0.125 秒)
New method ensures integrity of Savannah River’s radioactive material containers(图)
萨凡纳河 放射性物质 容器完整性
2024/3/7
Epigenetic dynamics during sexual reproduction: At the nexus of developmental control and genomic integrity
Plant sexual reproduction DNA methylation Histone modifications sRNA Developmental genes Sporogenesis Gametogenesis Seed development
2023/11/16
Epigenetic marks influence gene regulation and genomic stability via the repression of transposable elements. During sexual reproduction, tight regulation of the epigenome must take place to maintain ...
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:A LASSO-based Detection and Identification Method on Actuator Integrity Attacks in Remote Control Systems
LASSO 远程控制系统 执行器 完整性 攻击检测 识别方法
2023/4/28
Forward Integrity and Crash Recovery for Secure Logs
cryptographic protocols computer systems
2019/5/21
Logging is a key mechanism in the security of computer systems. Beyond supporting important forward security properties, it is critical that logging withstands both failures and intentional tampering ...
EVALUATING THE STRUCTURAL INTEGRITY OF THE SAINT ANTONIO BARREL VAULT IN THE FORTRESS OF ALMEIDA BY COMBINING LASER SCANNER AND LIMIT ANALYSIS
Historical construction Trace Italienne fortress Masonry Laser scanner Structural diagnosis Limit Analysis
2019/3/4
Under the framework of the modern theory of restoration, this paper shows the experimental results obtained during the structural diagnosis of one of the most important master gates inside the militar...
(R)CCA Secure Updatable Encryption with Integrity Protection
updatable encryption integrity, key rotation ciphertext-independence
2019/2/28
An updatable encryption scheme allows a data host to update ciphertexts of a client from an old to a new key, given so-called update tokens from the client. Rotation of the encryption key is a common ...
libInterMAC: Beyond Confidentiality and Integrity in Practice
fragmentation attack SSH Authenticated Encryption
2019/2/25
Boldyreva et al. (Eurocrypt 2012) defined a fine-grained security model capturing ciphertext fragmentation attacks against symmetric encryption schemes. The model was extended by Albrecht et al. (CCS ...
End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability
secure messaging mobile messaging
2018/11/16
In this paper, we describe Mobile CoWPI, a deployable, end-to-end secure mobile group messaging application with proofs of security. Mobile CoWPI allows dynamic groups of users to participate in, join...
Breaking Message Integrity of an End-to-End Encryption Scheme of LINE
E2EE LINE key exchange
2018/7/16
In this paper, we analyze the security of an end-to-end encryption scheme (E2EE) of LINE, a.k.a Letter Sealing. LINE is one of the most widely-deployed instant messaging applications, especially in Ea...
Cryptographic Constructions Supporting Implicit Data Integrity
Data Integrity Implicit Integrity Observer Functions
2018/6/5
We study a new methodology supporting data integrity called 'implicit integrity' and present cryptographic constructions supporting it. Implicit integrity allows for corruption detection without produ...
VeritasDB: High Throughput Key-Value Store with Integrity
key-value store guarantees data integrity
2018/3/8
While businesses shift their databases to the cloud, they continue to depend on them to operate correctly. Alarmingly, cloud services constantly face threats from exploits in the privileged computing ...
Scalable, transparent, and post-quantum secure computational integrity
zero knowledge computational integrity blockchains
2018/1/11
Human dignity demands that personal information, like medical and forensic data, be hidden from the public. But veils of secrecy designed to preserve privacy may also be abused to cover up lies and de...
IntegriKey: End-to-End Integrity Protection of User Input
End-to-End Integrity Protection User Input
2018/1/2
Networked critical systems, such as Programmable Logic Controllers in a factory plant, are often remotely configurable by administrators through web-based interfaces. However, administrative host mach...
The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much like its antecedents COPA, ELmE, and ELmD, COLM consists of two parallelizable encryption layers con...
陕西国际商贸学院国际经济学院英语写作课件Unit 5 Cheating,Plagiarism and Academic Integrity
陕西国际商贸学院国际经济学院 英语写作 课件 Unit 5 Cheating,Plagiarism and Academic Integrity
2017/4/11
陕西国际商贸学院国际经济学院英语写作课件Unit 5 Cheating,Plagiarism and Academic Integrity.