搜索结果: 1-15 共查到“Programs”相关记录426条 . 查询时间(0.125 秒)
School of Tourism and Hotel Management Graduate Programs
Tourism Hospitality Management Master PhD
2022/7/8
The School of Tourism and Hotel Management(STHM)of Dongbei University of Finance&Economics(STHM)was founded in 1995 and is one of the leading institutions in Mainland China offering top quality educat...
In this article, we propose new heuristics for minimizing the amount of XOR gates required to compute a system of linear equations in GF(2). We first revisit the well known Boyar-Peralta strategy and ...
Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs
attribute-based signatures arithmetic branching programs arithmetic span programs
2019/4/10
This paper presents the first attribute-based signature (ABS) scheme in which the correspondence between signers and signatures is captured in an arithmetic model of computation. Specifically, we desi...
Review of National and International Accreditation of Pharmacy Programs in the Gulf Cooperation Council Countries
international accreditation pharmacy education Gulf Cooperation Council (GCC) countries ACPE certification program national accreditation
2019/1/7
Objective. To compare the different philosophies, emphases and processes of national and international accreditation paths available to pharmacy programs in Gulf Cooperation Council (GCC) countries.To...
E$^3$: A Framework for Compiling C++ Programs with Encrypted Operands
Data Privacy Fully Homomorphic Encryption General-purpose computation
2018/11/2
The dramatic increase of data breaches in modern computing platforms has emphasized that access control is not sufficient to protect sensitive user data. Even in the case of honest parties, unknown so...
包头师范学院计算机辅助教学语言课件Unit5 Designing CALL Programs and Activities
包头师范学院 计算机辅助教学语言 课件 Unit5 Designing CALL Programs and Activities
2018/8/15
包头师范学院计算机辅助教学语言课件Unit5 Designing CALL Programs and Activities。
Error-Detecting in Monotone Span Programs with Application to Communication Efficient Multi-Party Computation
MPC cryptographic protocols
2018/5/22
Recent improvements in the state-of-the-art of MPC for non-full-threshold access structures introduced the idea of using a collision-resistant hash functions and redundancy in the secret-sharing schem...
GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates
Graded encodings indistinguishability obfuscation
2018/4/19
We present new constructions of private constrained PRFs and lockable obfuscation, for constraints (resp. functions to be obfuscated) that are computable by general branching programs. Our constructio...
Symbolic Side-Channel Analysis for Probabilistic Programs
Side-Channel Attacks Quantitative Information Flow Symbolic Execution
2018/4/11
In this paper we describe symbolic side-channel analysis techniques for detecting and quantifying information leakage, given in terms of Shannon and Min Entropy. Measuring the precise leakage is chall...
Developing China's National Emission Trading Scheme: Experiences from Existing Global Schemes and China's Pilot Programs
carbon dioxide (CO2) greenhouse gas emissions climate change energy policy pilot program
2018/4/3
Market-based emission trading schemes (ETSs) are widely used in the developed world to reduce greenhouse gas (GHG) emissions which are perceived as the source of global climate change. China, as the l...
Recently a lot of attention is paid to the search for efficiently implementable MDS matrices for lightweight symmetric primitives. Previous work concentrated on locally optimizing the multiplication w...
Obfuscating Compute-and-Compare Programs under LWE
public-key cryptography learning-with-errors
2017/3/27
We show how to obfuscate a large and expressive class of programs, which we call compute-and-compare programs, under the learning-with-errors (LWE) assumption. Each such program CC[f,y]CC[f,y] is para...
Efficient Maliciously Secure Two Party Computation for Mixed Programs
cryptographic protocols secure computation
2017/2/20
We propose a new approach for practical secure two-party computation (2PC) achieving security in the presence of malicious adversaries. Given a program to compute, the idea is to identify subcomputati...
We describe a new succinct zero-knowledge argument protocol with the following properties. The prover commits to a large data-set MM, and can thereafter prove many statements of the form ∃w:Ri(M...
Optimizing Secure Computation Programs with Private Conditionals
languages for secure computation static analysis graph theory
2016/12/8
Secure multiparty computation platforms are often provided with a programming language that allows
to write privacy-preserving applications without thinking of the underlying cryptography. The contro...