搜索结果: 1-10 共查到“军事学 frequency”相关记录10条 . 查询时间(0.187 秒)
Frequency-smoothing encryption: preventing snapshot attacks on deterministically-encrypted data
encrypted database snapshot attack inference attack
2017/11/13
Naveed, Kamara, and Wright (CCS 2015) applied classical frequency analysis to carry out devastating inference attacks on databases in which the columns are encrypted with deterministic and order-prese...
Time-Frequency Analysis for Second-Order Attacks
Bi-variate attacks zero-offset 2O-CPA discrete Hartley transform
2016/12/10
Second-order side-channel attacks are used to break first-order masking protections. A practical reason which often limits the efficiency of second-order attacks is the temporal localisation of the le...
Differentially Private Password Frequency Lists
Password Frequencies Differential Privacy Exponential Mechanism
2016/2/23
Given a dataset of user-chosen passwords, the frequency list reveals the frequency of each unique password. We present a novel mechanism for releasing perturbed password frequency lists with rigorous ...
Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data
cryptographic protocols encrypted data
2016/1/5
We study the problem of private outsourced sorting of encrypted data. We start by proposing a novel sorting protocol that allows a user to outsource his data to a cloud server in an encrypted form and...
A note on the optimality of frequency analysis vs. ℓp-optimization
Property-Preserving Encrypted Databases
2015/12/18
Naveed, Kamara, and Wright’s recent paper “Inference Attacks on Property-Preserving Encrypted
Databases” (ACM-CCS 2015) evaluated four attacks on encrypted databases, such as those based
on the desi...
This paper investigated the use of instantaneous frequency (IF) instead of power amplitude and power spectrum in side-channel analysis. By opposition to the constant frequency used in Fourier Transfor...
A Frequency Leakage Model and its application to CPA and DPA
Leakage Model Frequency Domain
2014/3/13
This paper introduces a leakage model in the frequency domain to enhance the efficiency of Side Channel Attacks of CMOS circuits. While usual techniques are focused on noise removal around clock harmo...
Secure EPC Gen2 compliant Radio Frequency Identification
EPCGen2 compliance security identification
2009/6/12
The increased functionality of EPC Class1 Gen2 (EPCGen2)
is making this standard a de facto specification for inexpensive tags in
the RFID industry. Recently three EPCGen2 compliant protocols that
...
Preface to the Topical Papers on Optical Frequency Standard and Its Applications at the Telecommunication Region
Optical Frequency Standard Telecommunication Region
2009/6/12
Preface to the Topical Papers on Optical Frequency Standard and Its Applications at the Telecommunication Region.
Adversarial Model for Radio Frequency Identification
RFID Adversarial Model Privacy Untraceability
2009/1/16
Radio Frequency Identification (RFID) systems aim to identify objects in open environments with neither physical nor visual contact. They consist of transponders inserted into objects, of readers, and...