搜索结果: 1-7 共查到“军事学 Content”相关记录7条 . 查询时间(0.125 秒)
Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption
message franking designated verifier signatures deniability
2019/5/28
Content moderation is crucial for stopping abuse and harassment via messaging on online platforms. Existing moderation mechanisms, such as message franking, require platform providers to see user iden...
TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation
non-repudiation blockchain TLS
2017/6/22
An internet user wanting to share observed content is typically restricted to primitive techniques such as screenshots, web caches or share button-like solutions. These acclaimed proofs, however, are ...
Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version)
Content-Based Image Retrieval (CBIR) Searchable Symmetric Encryption (SSE) Encrypted Data Processing
2015/12/24
Storage requirements for visual data have been increasing in recent years, following the emergence of many new
highly interactive multimedia services and applications for both personal and corporate ...
A Content Certified E-mail Protocol with a Public Mailbox
Content Certified E-mail Protocol Public Mailbox
2009/4/17
A Content Certified E-mail Protocol with a Public Mailbox.
Motivated by emerging needs in online interactions, we define a new type of digital signature
called a `Content Extraction Signature' (CES). A CES allows the owner, Bob, of a document
signed by Alic...
REGIONAL BLACKOUTS: PROTECTION OF BROADCAST CONTENT ON 3G NETWORKS
Regional Blackouts Broadcast Content 3G Networks
2009/3/27
One of the driving forces behind the development of 3G
systems is the potential to deliver complex content to
consumers. This is evident from the growing collaboration
between broadcast and mobile ...
Controlling Spam by Secure Internet Content Selection
Controlling Spam Secure Internet Content Selection
2009/3/27
Unsolicited and undesirable e-mail (spam) is a growing problem for Internet users and service providers.
We present the Secure Internet Content Selection (SICS) protocol, an efficient cryptographic m...