搜索结果: 16-28 共查到“军事学 Aggregation”相关记录28条 . 查询时间(0.065 秒)
Private aggregation on untrusted servers with customizable thresholds
cryptographic protocols privacy
2014/3/7
While multiparty computations are becoming more and more efficient, their performance has not yet reached the level needed to be widely deployed for many applications. Nevertheless, the heterogeneous ...
Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud
Outsourced Databases Flexible
2014/3/7
For securing databases outsourced to the cloud, it is important to allow cloud users to verify that their queries to the cloud-hosted databases are correctly executed by the cloud. Existing solutions ...
Private Over-threshold Aggregation Protocols over Distributed Databases
Network traffic distribution data aggregation
2014/3/10
In this paper, we revisit the private over-threshold data aggregation problem, and formally define the problem's security requirements as both data and user privacy goals. To achieve both goals, and t...
Privacy-Preserving Stream Aggregation with Fault Tolerance
Differential Privacy Periodic Aggregation Untrusted Aggregator Fault Tolerance
2012/6/14
We consider applications where an untrusted aggregator would like to collect privacy sensitive data from users, and compute aggregate statistics periodically. For example, imagine a smart grid operato...
Privacy-Preserving Stream Aggregation with Fault Tolerance
applications / Differential Privacy Periodic Aggregation Untrusted Aggregator Fault Tolerance Dynamic Users
2012/3/20
We consider applications where an untrusted aggregator would like to collect privacy sensitive data from users, and compute aggregate statistics periodically. For example, imagine a smart grid operato...
Efficient and Provably Secure Identity Based Aggregate Signature Schemes With Partial and Full Aggregation
Identity Based Signature Aggregate Signature Random Oracle Model Provable Security
2010/9/1
An identity based signature allows users to sign their documents using their private keys and the signature can be verified by any user by using the identity of the signer and public parameters of the...
Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks
End-by-Hop Protocol Secure Aggregation Sensor Networks
2009/6/23
In order to save bandwidth and thus battery power, sensor network measurements
are sometimes aggregated en-route while being reported back to the querying server. Authentication
of the measurements ...
Collaborative, Privacy-Preserving Data Aggregation at Scale
privacy-preserving collaboration Privacy-Preserving Data Aggregation malicious attack
2009/6/12
Combining and analyzing data collected at multiple locations is
critical for a wide variety of applications, such as detecting and
diagnosing malicious attacks or computing an accurate estimate of
...
Efficient Certificateless Signatures Suitable for Aggregation
Efficient Certificateless Signatures Aggregation
2009/6/2
This technical report describes a novel certificateless signature scheme suitable for
aggregation that requires no pairing computations for signing and only 3 pairing computations
for signature veri...
Deterministic Identity-Based Signatures for Partial Aggregation
Deterministic Identity-Based Signatures Partial Aggregation
2009/3/4
Aggregate signatures are a useful primitive which allows to aggregate into
a single and constant-length signature many signatures on dierent messages
computed by dierent users. Specic proposals o...
DSAC:An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining
DSAC Ensure Integrity Outsourced Databases Signature Aggregation and Chaining
2009/3/2
Database outsourcing is an important emerging trend which
involves data owners delegating their data management needs
to an external service provider. In this model, a service
provider hosts client...
Provably Secure Framework for Information Aggregation in Sensor Networks
Secure Framework Information Aggregation Sensor Networks
2008/8/14
Information aggregation is an important operation in wireless sensor
networks executed for the purpose of monitoring and reporting of the environmental
data.
Efficient Certificateless Signatures Suitable for Aggregation
Efficient Certificateless Signatures Aggregation
2008/5/21
This technical report describes a novel certificateless signature scheme suitable for
aggregation that requires no pairing computations for signing and only 3 pairing computations
for signature veri...