全部 |
  • 全部
  • 题名
  • 作者
  • 机构
  • 关键词
  • NSTL主题词
  • 摘要
检索 二次检索 AI检索
外文文献 中文文献
筛选条件:

1. Polynomial delay hybrid algorithms to enumerate candidate keys for a relation NSTL国家科技图书文献中心

Ennaoui, Karima |  Nourine, Lhouari -  《Discrete Applied Mathematics》 - 2025,360 - 443~450 - 共8页

摘要:We investigate the problem of candidate keys |  keys is also known as minimal generators in lattice |  enumerate all candidate keys of a relation schema. Using |  candidate keys, and we show that the number of keyideal |  sets then there is one for all candidate keys. We
关键词: Candidate keys |  Minimal generators |  Enumeration problem |  Posets

2. SoK: Signatures with Randomizable Keys NSTL国家科技图书文献中心

Sofia Celi |  Scott Griffy... -  《Financial Cryptography and Data Security,Part II》 -  International Conference on Financial Cryptography and Data Security - 2025, - 160~187 - 共28页

摘要: happens when transformations apply to the signing keys |  signatures with random-izable keys and revisit their |  signatures with randomizable keys. | Digital signature schemes with specific |  properties have recently seen various real-world
关键词: Digital signatures |  Key blinding |  Key randomization

3. A Retrospective Look at Local, State, and Federal Protected Areas in and Around the Florida Keys NSTL国家科技图书文献中心

Joel T. Heinen -  《Natural areas journal》 - 2025,45(1) - 11~19 - 共9页

摘要:The Florida Keys extend nearly 320 km (200 |  rare taxa and ecological complexes. The Keys reef | . The Keys also harbor archaeological sites dating |  the Keys, and the many species they support, are |  Florida Keys and adjacent areas on the mainland and
关键词: Biscayne Bay |  Dry Tortugas |  Everglades |  Florida Bay |  Florida Keys |  marine protected areas

4. Reminisce for Securing Private-Keys in Public NSTL国家科技图书文献中心

Shlomi Dolev |  Komal Kumari... -  《Cyber Security,Cryptology,and Machine Learning》 -  International Symposium on Cyber Security,Cryptography and Machine Learning - 2025, - 168~177 - 共10页

摘要: and manage their own private keys, minimizing the |  store and retrieve their private keys. We utilize | The private key associated with a blockchain |  is the sole means of linking a cryptocurrency asset |  to its owner, and any loss or compromise of this
关键词: Crypto-wallets |  Crypto-currency |  Bitcoin |  Blockchain |  Bloom filter |  Public cloud |  Memorized secrets

5. iVault: Architectural Code Concealing Techniques to Protect Cryptographic Keys NSTL国家科技图书文献中心

George Christou |  Giorgos Vasiliadis... -  《Embedded Computer Systems: Architectures,Modeling,and Simulation,Part II》 -  International Conference on Embedded Computer Systems - 2025, - 152~164 - 共13页

摘要:. These arbitrary reads can target cryptographic keys |  securely store private and secret cryptographic keys | . iVault encodes cryptographic keys within the machine |  viable solution for safeguarding cryptographic keys. | Memory corruption bugs remain a significant
关键词: Hardware assisted security |  Key management

6. Discovering a Representative Set of Link Keys in RDF Datasets NSTL国家科技图书文献中心

Nacira Abbas |  Alexandre Bazin... -  《Knowledge Engineering and Knowledge Management》 -  International Conference on Knowledge Engineering and Knowledge Management - 2025, - 53~68 - 共16页

摘要: link keys which usually output a large number of |  candidates for building a representative set of link keys | A link key is based on a set of property pairs |  and can be used to identify pairs of individuals |  representing the same real-world entity in two different RDF
关键词: Link key discovery |  Formal concept analysis |  Hierarchical clustering |  RDF dataset |  Representative set

7. Misbinding Raw Public Keys to Identities in TLS NSTL国家科技图书文献中心

Mariam Moustafa |  Mohit Sethi... -  《Secure IT Systems》 -  Nordic Conference on Secure IT Systems - 2025, - 62~79 - 共18页

摘要: Keys (PSK). We develop a formal model of TLS RPK | The adoption of security protocols such as |  Transport Layer Security (TLS) has significantly improved |  the state of traffic encryption and integrity |  protection on the Internet. Despite rigorous analysis
关键词: TLS |  Raw public key |  Identity misbinding |  Formal modeling

8. Iron keys from the Roman Province of Iudaea/Palaestina: a typological and technological study NSTL国家科技图书文献中心

Pagelson, Yarden |  Farhi, Yoav... -  《Archaeological and anthropological sciences》 - 2025,17(5) - 共20页

摘要: were fantastically preserved, including 10 iron keys |  then, dozens of iron keys have been found in |  the keys and argue that distinct types relate to | . Moreover, we suggest that elbow keys are a local type of |  population. In addition, we reconstruct how the keys were
关键词: Roman archaeology |  Ferrous archaeometallurgy |  Key typology |  Late antique small finds |  Provincia Iudaea

9. Post-quantum secure compact deterministic wallets from isogeny-based signatures with rerandomized keys NSTL国家科技图书文献中心

Shaw, Surbhi |  Dutta, Ratna -  《Theoretical computer science》 - 2025,1035 - 共29页

摘要: signature schemes with rerandomizable keys (rerandomizable |  perfectly rerandomizable keys are central to the |  keys. To ensure post-quantum security, we instantiate | ) and CSI-FiSh with Sharing-friendly Keys (CSI-SharK |  rerandomizable keys from isogenies. Additionally, we seamlessly
关键词: Post-quantum cryptography |  Deterministic wallet |  Isogenies |  Rerandomizable signature |  Blockchain protocols |  Cryptographic group action

10. Spatiotemporal patterns in Diadema antillarum settlement in the Florida Keys: implications for habitat restoration NSTL国家科技图书文献中心

Skowronski, Julia S. |  Sharp, William C.... -  《Coral reefs》 - 2025,44(3) - 911~922 - 共12页

摘要: to reef degradation. In the Florida Keys, where D |  the middle/upper Florida Keys compared to the lower |  Keys. Seasonal variation indicated peak settlement in |  Florida Keys as priority sites for enhancing settlement | The long-spined sea urchin (Diadema antillarum
关键词: Sea urchin |  Habitat restoration |  Larval supply |  Coral reef |  Macroalgae
检索条件Keys

NSTL主题词

  • NSTL学科导航