全部 |
  • 全部
  • 题名
  • 作者
  • 机构
  • 关键词
  • NSTL主题词
  • 摘要
检索 二次检索 AI检索
外文文献 中文文献
筛选条件:

1. Polynomial delay hybrid algorithms to enumerate candidate keys for a relation NSTL国家科技图书文献中心

Ennaoui, Karima |  Nourine, Lhouari -  《Discrete Applied Mathematics》 - 2025,360 - 443~450 - 共8页

摘要:We investigate the problem of candidate keys |  keys is also known as minimal generators in lattice |  enumerate all candidate keys of a relation schema. Using |  candidate keys, and we show that the number of keyideal |  sets then there is one for all candidate keys. We
关键词: Candidate keys |  Minimal generators |  Enumeration problem |  Posets

2. SoK: Signatures with Randomizable Keys NSTL国家科技图书文献中心

Sofia Celi |  Scott Griffy... -  《Financial Cryptography and Data Security,Part II》 -  International Conference on Financial Cryptography and Data Security - 2025, - 160~187 - 共28页

摘要: happens when transformations apply to the signing keys |  signatures with random-izable keys and revisit their |  signatures with randomizable keys. | Digital signature schemes with specific |  properties have recently seen various real-world
关键词: Digital signatures |  Key blinding |  Key randomization

3. A Retrospective Look at Local, State, and Federal Protected Areas in and Around the Florida Keys NSTL国家科技图书文献中心

Joel T. Heinen -  《Natural areas journal》 - 2025,45(1) - 11~19 - 共9页

摘要:The Florida Keys extend nearly 320 km (200 |  rare taxa and ecological complexes. The Keys reef | . The Keys also harbor archaeological sites dating |  the Keys, and the many species they support, are |  Florida Keys and adjacent areas on the mainland and
关键词: Biscayne Bay |  Dry Tortugas |  Everglades |  Florida Bay |  Florida Keys |  marine protected areas

4. Reminisce for Securing Private-Keys in Public NSTL国家科技图书文献中心

Shlomi Dolev |  Komal Kumari... -  《Cyber Security,Cryptology,and Machine Learning》 -  International Symposium on Cyber Security,Cryptography and Machine Learning - 2025, - 168~177 - 共10页

摘要: and manage their own private keys, minimizing the |  store and retrieve their private keys. We utilize | The private key associated with a blockchain |  is the sole means of linking a cryptocurrency asset |  to its owner, and any loss or compromise of this
关键词: Crypto-wallets |  Crypto-currency |  Bitcoin |  Blockchain |  Bloom filter |  Public cloud |  Memorized secrets

5. iVault: Architectural Code Concealing Techniques to Protect Cryptographic Keys NSTL国家科技图书文献中心

George Christou |  Giorgos Vasiliadis... -  《Embedded Computer Systems: Architectures,Modeling,and Simulation,Part II》 -  International Conference on Embedded Computer Systems - 2025, - 152~164 - 共13页

摘要:. These arbitrary reads can target cryptographic keys |  securely store private and secret cryptographic keys | . iVault encodes cryptographic keys within the machine |  viable solution for safeguarding cryptographic keys. | Memory corruption bugs remain a significant
关键词: Hardware assisted security |  Key management

6. Discovering a Representative Set of Link Keys in RDF Datasets NSTL国家科技图书文献中心

Nacira Abbas |  Alexandre Bazin... -  《Knowledge Engineering and Knowledge Management》 -  International Conference on Knowledge Engineering and Knowledge Management - 2025, - 53~68 - 共16页

摘要: link keys which usually output a large number of |  candidates for building a representative set of link keys | A link key is based on a set of property pairs |  and can be used to identify pairs of individuals |  representing the same real-world entity in two different RDF
关键词: Link key discovery |  Formal concept analysis |  Hierarchical clustering |  RDF dataset |  Representative set

7. Misbinding Raw Public Keys to Identities in TLS NSTL国家科技图书文献中心

Mariam Moustafa |  Mohit Sethi... -  《Secure IT Systems》 -  Nordic Conference on Secure IT Systems - 2025, - 62~79 - 共18页

摘要: Keys (PSK). We develop a formal model of TLS RPK | The adoption of security protocols such as |  Transport Layer Security (TLS) has significantly improved |  the state of traffic encryption and integrity |  protection on the Internet. Despite rigorous analysis
关键词: TLS |  Raw public key |  Identity misbinding |  Formal modeling

8. Post-quantum secure compact deterministic wallets from isogeny-based signatures with rerandomized keys NSTL国家科技图书文献中心

Shaw, Surbhi |  Dutta, Ratna -  《Theoretical computer science》 - 2025,1035 - 共29页

摘要: signature schemes with rerandomizable keys (rerandomizable |  perfectly rerandomizable keys are central to the |  keys. To ensure post-quantum security, we instantiate | ) and CSI-FiSh with Sharing-friendly Keys (CSI-SharK |  rerandomizable keys from isogenies. Additionally, we seamlessly
关键词: Post-quantum cryptography |  Deterministic wallet |  Isogenies |  Rerandomizable signature |  Blockchain protocols |  Cryptographic group action

9. Antireflux surgeries and hiatal repair: keys to success NSTL国家科技图书文献中心

Watson, Abigail Clai... |  Watson, David Ian -  《Expert review of gastroenterology & hepatology》 - 2025,19(2) - 181~195 - 共15页

摘要:Introduction: Gastroesophageal reflux is |  common, and when medical therapy is ineffective | , alternative treatments should be considered. Nissen |  fundoplication controls reflux but can be followed by side |  effects such as dysphagia and flatulence. To improve
关键词: Fundoplication |  gastroesophageal reflux |  laparoscopic surgery |  hiatus hernia |  surgery

10. Distributing Keys and Random Secrets with Constant Complexity NSTL国家科技图书文献中心

Benny Applebaum |  Benny Pinkas -  《Theory of Cryptography,Part IV》 -  Theory of Cryptography Conference - 2025, - 485~516 - 共32页

摘要:In the Distributed Secret Sharing Generation |  (DSG) problem n parties wish to obliviously sample a |  secret-sharing of a random value s taken from some |  finite field, without letting any of the parties learn |  s. Distributed Key Generation (DKG) is a closely
关键词: Secret sharing |  Distributed key generation |  Secure computation
检索条件Keys

NSTL主题词

  • NSTL学科导航