您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Priciples of Verifiable RTL Design

  2. Priciples of Verifiable RTL Design, 惠普大牛, RTL, 验证。 PDF 清晰文档。经典中的经典。
  3. 所属分类:硬件开发

    • 发布日期:2011-09-01
    • 文件大小:1mb
    • 提供者:shan123456
  1. Principles of Verifiable RTL Design

  2. Principles of Verifiable RTL Design,一本关于验证的数。数字电路设计部分经典书籍推荐 IC 设计行业的朋友们推荐优秀的书籍和相关资料
  3. 所属分类:教育

    • 发布日期:2014-07-29
    • 文件大小:3mb
    • 提供者:nerohero
  1. SafetyNets: Verifiable Execution of Deep Neural Networks on an Untrusted Cloud

  2. SafetyNets: Verifiable Execution of Deep Neural Networks on an Untrusted Cloud NIPS2017会议论文
  3. 所属分类:深度学习

    • 发布日期:2017-12-17
    • 文件大小:440kb
    • 提供者:qq_33889075
  1. Publicly Verifiable Secret Sharing Scheme and Its Application with Almost Optimal Information Rate(在审)

  2. Publicly Verifiable Secret Sharing Scheme and Its Application with Almost Optimal Information Rate(在审)
  3. 所属分类:其它

    • 发布日期:2021-03-19
    • 文件大小:250kb
    • 提供者:weixin_38627213
  1. Incentivizing Verifiable Privacy-Protection Mechanisms for Offline Crowdsensing Applications

  2. Incentivizing Verifiable Privacy-Protection Mechanisms for Offline Crowdsensing Applications
  3. 所属分类:其它

    • 发布日期:2021-02-22
    • 文件大小:740kb
    • 提供者:weixin_38643307
  1. An Efficient Encryption Scheme with Verifiable Outsourced Decryption in Mobile Cloud Computing

  2. An Efficient Encryption Scheme with Verifiable Outsourced Decryption in Mobile Cloud Computing
  3. 所属分类:其它

    • 发布日期:2021-02-22
    • 文件大小:336kb
    • 提供者:weixin_38714162
  1. Verifiable Computation of Large Polynomials

  2. Verifiable Computation of Large Polynomials
  3. 所属分类:其它

    • 发布日期:2021-02-22
    • 文件大小:295kb
    • 提供者:weixin_38658471
  1. VP2RQ:Efficient Verifiable Privacy-Preserving Range Query Processing in Two-tieredWireless Sensor Networks

  2. VP2RQ:Efficient Verifiable Privacy-Preserving Range Query Processing in Two-tieredWireless Sensor Networks
  3. 所属分类:其它

    • 发布日期:2021-02-21
    • 文件大小:854kb
    • 提供者:weixin_38732425
  1. Verifiable quantum (k, n)-threshold secret sharing

  2. Verifiable quantum (k, n)-threshold secret sharing
  3. 所属分类:其它

    • 发布日期:2021-02-21
    • 文件大小:166kb
    • 提供者:weixin_38665162
  1. Privacy-preserving verifiable delegation of polynomial and matrix functions

  2. Privacy-preserving verifiable delegation of polynomial and matrix functions
  3. 所属分类:其它

  1. VKSE-MO: verifiable keyword search over encrypted data in multi-owner settings

  2. VKSE-MO: verifiable keyword search over encrypted data in multi-owner settings
  3. 所属分类:其它

    • 发布日期:2021-02-11
    • 文件大小:509kb
    • 提供者:weixin_38604330
  1. Cryptanalysis of a dynamic identity based remote user authentication scheme with verifiable password update

  2. Cryptanalysis of a dynamic identity based remote user authentication scheme with verifiable password update
  3. 所属分类:其它

    • 发布日期:2021-02-10
    • 文件大小:552kb
    • 提供者:weixin_38689338
  1. A verifiable proxy re-encryption with keyword search without Random Oracle

  2. A verifiable proxy re-encryption with keyword search without Random Oracle
  3. 所属分类:其它

    • 发布日期:2021-02-09
    • 文件大小:456kb
    • 提供者:weixin_38725734
  1. Efficient and Information-Theoretical Secure Verifiable Secret Sharing over Bilinear Groups

  2. Verifiable secret sharing (VSS) is an important technique which has been used as a basic tool in distributed cryptosystems, secure multi-party computations, as well as safe guarding some confidential information such as cryptographic keys. By now, so
  3. 所属分类:其它

    • 发布日期:2021-02-09
    • 文件大小:167kb
    • 提供者:weixin_38745859
  1. Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption

  2. Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption
  3. 所属分类:其它

    • 发布日期:2021-02-08
    • 文件大小:266kb
    • 提供者:weixin_38633475
  1. Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing

  2. Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
  3. 所属分类:其它

    • 发布日期:2021-02-08
    • 文件大小:713kb
    • 提供者:weixin_38746574
  1. Integrity-verifiable conjunctive keyword searchable encryption in cloud storage

  2. Integrity-verifiable conjunctive keyword searchable encryption in cloud storage
  3. 所属分类:其它

  1. Verifiable Outsourced Computation with Full Delegation

  2. Verifiable Outsourced Computation with Full Delegation
  3. 所属分类:其它

    • 发布日期:2021-02-08
    • 文件大小:420kb
    • 提供者:weixin_38751177
  1. Protecting Data Privacy in Publicly Verifiable Delegation of Matrix and Polynomial Functions

  2. Protecting Data Privacy in Publicly Verifiable Delegation of Matrix and Polynomial Functions
  3. 所属分类:其它

  1. Multi-Client Verifiable Computation Service of Polynomials on Outsourced Data

  2. Multi-Client Verifiable Computation Service of Polynomials on Outsourced Data
  3. 所属分类:其它

    • 发布日期:2021-02-07
    • 文件大小:312kb
    • 提供者:weixin_38733367
« 12 »