搜索结果: 1-15 共查到“Simulation-based”相关记录50条 . 查询时间(0.118 秒)
Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions
public key encryption receiver selective opening security chosen ciphertext security
2018/11/12
In the situation where there are one sender and multiple receivers, a receiver selective opening (RSO) attack for a public key encryption (PKE) scheme considers adversaries that can corrupt some of th...
Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks
simulation-based security selective opening security for receivers chosen-ciphertext attacks
2018/8/21
Security against selective opening attack (SOA) for receivers requires that in a multi-user setting, even if an adversary has access to all ciphertexts, and adaptively corrupts some fraction of the us...
Simulation-based Crisis Resource Management in Pharmacy Education
Simulation-based Crisis Management
2018/11/22
Objective. To describe strategies for implementation of simulation-based crisis resource management (CRM) in pharmacy education and present students’ appreciation of an interdisciplinary CRM training ...
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
Public-key encryption selective-opening security lossy encryption
2016/2/24
In a selective-opening (SO) attack on an encryption scheme, an adversary A gets a number of ciphertexts (with possibly related plain- texts), and can then adaptively select a subset of those ciphertex...
Simulation-Based Secure Functional Encryption in the Random Oracle Model
Functional Encryption Random Oracle Model Simulation-Based Security
2016/1/6
One of the main lines of research in functional encryption (FE) has consisted in studying the security notions for FE and their achievability. This study was initiated by [Boneh et al. -- TCC'11, O'Ne...
Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
public-key cryptography selective opening
2016/1/5
We study simulation-based, selective opening security against chosen-ciphertext attacks (SIM-SO-CCA security) for public key encryption (PKE). In a selective opening, chosen-ciphertext attack (SO-CCA)...
InSAR Imaging Geometry Simulation Based on Computer Graphics
Photogrammetry Land Simulation Computer Graphics Interferometer SAR
2015/11/23
To enhance the computational efficiency and precision of classical interferometric SAR(InSAR) imaging geometry simulation, computer graphics method was firstly introduced into imaging geometry simulat...
What can we see from Investment Simulation based on Generalized (m,2)-Zipf law?
eneralized Zipf law time series fluctuations investment
2015/8/5
The paper revisits the investment simulation based on strategies exhibited by Generalized (m,2)-Zipf law to present an interesting characterization of the wildness in financial time series. The invest...
SAR SIMULATION BASED CHANGE DETECTION WITH HIGH-RESOLUTION SAR IMAGES IN URBAN ENVIRONMENTS
SAR Change Detection City Disaster Radar Rectification Simulation
2015/7/29
Combined processing using different sensor types, i.e. for applications like change detection, requires a good geo-referencing. Furthermore the individual sensor properties have to be taken into accou...
Simulation-based Parameter Estimation for Complex Models: A Breast Cancer Natural History Modelling Illustration
Simulation-based Parameter Estimation Complex Models Breast Cancer Natural History Modelling Illustration
2015/7/6
Simulation-based parameter estimation offers a powerful means of estimating parameters in complex stochastic models. We illustrate the application of these ideas in the setting of a natural history mo...
Simulation-based Response Surface Estimation in the Presence of Monotonicity
Simulation-based Response Surface Estimation Presence Monotonicity
2015/7/6
In many stochastic models, it is known that the response surface corresponding to a particular performance measure is monotone in the underlying parameter. For example, the steady-state mean waiting t...
Limit Theorems for Simulation-based Optimization via
Simulation Theory Model Development: Methodologies Types of Simulation
2015/7/6
This paper develops fundamental theory related to the use of simulation-based non-adaptive random search as a means of optimizing a function that can be expressed as an expectation. Our results establ...
Simulation-Based Confidence Bounds for Two-Stage Stochastic Programs
Stochastic programming Linear programming Probability theory
2015/7/6
This paper provides a rigorous asymptotic analysis and justification of upper and lower confidence bounds proposed by Dantzig and Infanger (1995) for an iterative sampling-based decomposition algorith...
Simulation-Based Evaluation of WAAS Performance:Risk and Integrity Factors
Simulation-Based WAAS Performance Risk Integrity Factors
2015/6/29
The Wide Area Augmentation System (WAAS) uses an array of monitor stations that combine to compute GPS user corrections over the Continental U.S. Preliminary experiments have concluded that ionospheri...
Bayesian analysis of simulation-based models
Bayes factor Likelihood-free inference Simulation models Neurologically plausible cognitive models Probability density approximation method Leaky Competing Accumulator model Feed Forward Inhibition model
2015/6/23
Recent advancements in Bayesian modeling have allowed for likelihood-free posterior estimation. Such estimation techniques are crucial to the understanding of simulation-based models, whose likelihood...