咨询与建议

限定检索结果

文献类型

  • 3 篇 会议

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 计算机科学与技术...
    • 1 篇 电气工程

主题

  • 3 篇 character string...
  • 3 篇 character string
  • 3 篇 secure computing
  • 3 篇 character string...
  • 3 篇 cloud
  • 3 篇 string operation
  • 3 篇 string function
  • 3 篇 blind computing
  • 3 篇 cloud computing
  • 2 篇 string
  • 1 篇 secret sharing
  • 1 篇 repetition patte...
  • 1 篇 repetition patte...
  • 1 篇 dictionary attac...

机构

  • 2 篇 univ hagen north...
  • 1 篇 univ vienna a-10...
  • 1 篇 univ hagen univ ...

作者

  • 3 篇 fahrnberger guen...
  • 1 篇 heneis kathrin

语言

  • 3 篇 英文
检索条件"主题词=character string function"
3 条 记 录,以下是1-10 订阅
排序:
Repetition Pattern Attack on Multi-word-containing Securestring 2.0 Objects  11
Repetition Pattern Attack on Multi-word-containing SecureStr...
收藏 引用
11th International Conference on Distributed Computing and Internet Technology (ICDCIT)
作者: Fahrnberger, Guenter Univ Hagen North Rhine Westphalia Germany
Cloud computing appeals to private individuals and particularly enterprises at a progressive rate, but a noticeable percentage of them refuse it due to mistrust or missing commitment to security. The cryptosystem Secu... 详细信息
来源: 评论
A Second View on Securestring 2.0
收藏 引用
10th International Conference on Distributed Computing and Internet Technology (ICDCIT)
作者: Fahrnberger, Guenter Univ Hagen Univ Str 1 D-58097 Hagen Germany
Many companies have thought about using external hosting solutions. Cloud computing as such a solution attracts prospective users who want to avoid initial costs and standing expenses with the underlying pay-as-you-us... 详细信息
来源: 评论
Securestring 3.0 A Cryptosystem for Blind Computing on Encrypted character strings  11
SecureString 3.0 A Cryptosystem for Blind Computing on Encry...
收藏 引用
11th International Conference on Distributed Computing and Internet Technology (ICDCIT)
作者: Fahrnberger, Guenter Heneis, Kathrin Univ Hagen North Rhine Westphalia Germany Univ Vienna A-1010 Vienna Austria
If (electronic) computations need to be undertaken, then mostly performance or commercial aspects lead to the selection for an optimal executing computer. In case the beneficiary of the computation upshots does not wh... 详细信息
来源: 评论