搜索结果: 1-8 共查到“知识库 军事学 Capabilities”相关记录8条 . 查询时间(0.015 秒)
Improving Our CWMD Capabilities: Who Will Lead?
CWMD Capabilities Policymaking Major Combat Operations
2018/5/18
In December 2016, the media announced that U.S. Special Operations Command (USSOCOM) would take the lead role within the Department of Defense (DOD) for countering weapons of mass destruction (WMD).1&...
North Korea's CBW Program: How to Contend with Imperfectly Understood Capabilities
North Korea's CBW Understood Capabilities Iraq Moment
2018/5/15
Any major conflict on the Korean Peninsula would put thousands of lives at risk even if it were well short of a nuclear exchange. The conventional forces aligned along the 38th parallel, the bord...
Watermarking Cryptographic Capabilities
watermarking, indistingushability obfuscation puncturable PRFs
2015/12/21
A watermarking scheme for programs embeds some information called a mark into a program while
preserving its functionality. No adversary can remove the mark without damaging the functionality of
the...
A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities
Authenticated Key Exchange Provable Security Security Model
2014/1/4
The most widely accepted models in the security proofs of Authenticated Key Exchange protocols are the Canetti-Krawczyk model and the extended Canetti-Krawczyk model that admit different adversarial q...
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders
Hash Functions Domain Extension MPP
2009/6/12
Two of the most recent and powerful multi-property-preserving (MPP) hash domain extension transforms
are the Ramdom-Oracle-XOR (ROX) transform and the Enveloped Shoup (ESh) transform. The former
was...
Delegating Capabilities in Predicate Encryption Systems
Delegating Capabilities Predicate Encryption Systems Diffie-Hellman assumption
2009/6/5
In predicate encryption systems, given a capability, one can evaluate one or more predicates on
the encrypted data, while all other information about the plaintext remains hidden. We consider
the fi...
Incorporating Temporal Capabilities in Existing Key Management Schemes
Incorporating Temporal Capabilities Key Management Schemes
2008/8/20
The problem of key management in access hierarchies is how to assign keys to users and classes such that each user, after receiving her secret key(s), is able to independently compute access keys for ...
一种基于用户的Capabilities安全模型及其实现
Capabilities Linux 访问控制
2008/5/20
分析了Linux下Capabilities安全模型的不完善性,并提出了一种基于用户的Capabilities安全模型,给出了在Linux下的实现方式。同时,还分析了如何利用改进后的安全模型来增强Linux的安全性。