军事学 >>> 军事学
搜索结果: 1-8 共查到知识库 军事学 Capabilities相关记录8条 . 查询时间(0.015 秒)
In December 2016, the media announced that U.S. Special Operations Command (USSOCOM) would take the lead role within the Department of Defense (DOD) for countering weapons of mass destruction (WMD).1&...
Any major conflict on the Korean Peninsula would put thousands of lives at risk even if it were well short of a nuclear exchange. The conventional forces aligned along the 38th parallel, the bord...
A watermarking scheme for programs embeds some information called a mark into a program while preserving its functionality. No adversary can remove the mark without damaging the functionality of the...
The most widely accepted models in the security proofs of Authenticated Key Exchange protocols are the Canetti-Krawczyk model and the extended Canetti-Krawczyk model that admit different adversarial q...
Two of the most recent and powerful multi-property-preserving (MPP) hash domain extension transforms are the Ramdom-Oracle-XOR (ROX) transform and the Enveloped Shoup (ESh) transform. The former was...
In predicate encryption systems, given a capability, one can evaluate one or more predicates on the encrypted data, while all other information about the plaintext remains hidden. We consider the fi...
The problem of key management in access hierarchies is how to assign keys to users and classes such that each user, after receiving her secret key(s), is able to independently compute access keys for ...
分析了Linux下Capabilities安全模型的不完善性,并提出了一种基于用户的Capabilities安全模型,给出了在Linux下的实现方式。同时,还分析了如何利用改进后的安全模型来增强Linux的安全性。

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...