期刊文献+
共找到168篇文章
< 1 2 9 >
每页显示 20 50 100
云计算里一种陷门无法识别的公钥搜索加密方案 被引量:17
1
作者 赵洋 包文意 +1 位作者 熊虎 秦志光 《信息网络安全》 2016年第1期1-5,共5页
传统公钥搜索加密方案使用户能够在加密的条件下通过关键字搜索数据,但是这种方式需要通过安全信道的保证,而且它提供的陷门被证明是不安全的。虽然陷门无法识别的方案已经被提出,但是却不能支持模糊关键字搜索,这大大减弱了系统的有效... 传统公钥搜索加密方案使用户能够在加密的条件下通过关键字搜索数据,但是这种方式需要通过安全信道的保证,而且它提供的陷门被证明是不安全的。虽然陷门无法识别的方案已经被提出,但是却不能支持模糊关键字搜索,这大大减弱了系统的有效性。文章提出的方案满足三个要求,一是利用服务器的公钥来加密关键字和数据文件,外部攻击者没有服务器密钥就不能从中得到任何信息,也就可以不用安全信道来传输;二是提出了一种陷门无法识别性方案,这样外部攻击者不能用关键字猜测攻击来攻击陷门;三是方案不仅支持精确关键字搜索加密,当输入的关键字有任何拼写错误或格式不一致的情况时,该方案也支持搜索,从而大大提高了系统的可用性。文章证明了该方案是安全的,满足私人保护的性质。 展开更多
关键词 云计算 公钥搜索加密 模糊关键字 陷门
下载PDF
儿童trapdoor眼眶骨折临床分析 被引量:8
2
作者 李晓明 宋鄂 魏世辉 《眼科新进展》 CAS 北大核心 2010年第7期658-660,共3页
目的通过分析儿童trapdoor眼眶骨折病例,探讨儿童trapdoor眼眶骨折的常见病因、临床表现及手术疗效。方法回顾2003年1月至2009年10月确诊为儿童眼眶爆裂性骨折21例患儿,11例11眼为trapdoor眼眶骨折。对11例患儿进行临床回顾性分析。结果... 目的通过分析儿童trapdoor眼眶骨折病例,探讨儿童trapdoor眼眶骨折的常见病因、临床表现及手术疗效。方法回顾2003年1月至2009年10月确诊为儿童眼眶爆裂性骨折21例患儿,11例11眼为trapdoor眼眶骨折。对11例患儿进行临床回顾性分析。结果 11例trapdoor眼眶骨折患儿主要眼部表现为患眼上转伴下转受限10例(90.9%)、仅上转受限1例(9.1%),眼球运动垂直位转动受限伴恶心、呕吐7例(63.6%),手术距受伤时间间隔为10~36d,平均(17.0±6.9)d。术后随访1~2个月,眼球上转、下转受限较术前均有轻度改善,但双眼向下注视仍存在复视。结论 Trapdoor眼眶骨折主要临床表现为患侧垂直位眼球运动障碍,可伴恶心、呕吐,眶部CT表现为眶下壁一窄裂,下直肌等眶内软组织常被箝闭于骨折处。晚期手术(伤后10d以上)疗效欠佳。 展开更多
关键词 trapdoor 眼眶骨折 儿童
下载PDF
面向云存储的带关键词搜索的公钥加密方案 被引量:10
3
作者 郭丽峰 李智豪 胡磊 《计算机研究与发展》 EI CSCD 北大核心 2020年第7期1404-1414,共11页
广泛应用于云存储环境的带关键词搜索的公钥加密体制(public key encryption with keyword search,PEKS)不仅能保证所存储数据的隐私,而且具有搜索功能.针对抵制内部离线关键词猜测攻击问题,目前的解决方案是通过引入发送者的私钥,使得... 广泛应用于云存储环境的带关键词搜索的公钥加密体制(public key encryption with keyword search,PEKS)不仅能保证所存储数据的隐私,而且具有搜索功能.针对抵制内部离线关键词猜测攻击问题,目前的解决方案是通过引入发送者的私钥,使得密文实现认证功能,从而抵制内部的离线关键词猜测攻击,但是此方法使得接收者必须事先指定发送者,这不符合实际要求.为此,提出一个高效的带关键词搜索的公钥加密方案而且在标准模型下可证明安全.该方案有3个优势:1)通过引入发送者和服务器的身份,实现了抵制内部和外部离线关键词猜测攻击,而且不需要接收者指定发送者;2)通过引入服务器的公私钥对,陷门可以在公开信道传输;3)因为任何人都可验证关键词密文的正确性,该方案能够抵制选择关键词密文攻击. 展开更多
关键词 可搜索加密 关键词搜索 在线和离线的关键词猜测攻击 双线性对 陷门
下载PDF
基于合数阶双线性群的多用户陷门不可区分可搜索加密方案
4
作者 梁哲华 佟国香 《计算机与数字工程》 2024年第1期190-194,226,共6页
可搜索加密是云存储环境下密文检索的主要技术。针对以去除安全信道构造的公共密钥可搜索加密方案SCF-PEKS加密时依赖用户公钥导致搜索服务限于单一用户,及无安全信道的可搜索加密方式容易遭受外部敌手的关键字猜测攻击等问题,分析并证... 可搜索加密是云存储环境下密文检索的主要技术。针对以去除安全信道构造的公共密钥可搜索加密方案SCF-PEKS加密时依赖用户公钥导致搜索服务限于单一用户,及无安全信道的可搜索加密方式容易遭受外部敌手的关键字猜测攻击等问题,分析并证明了现有多用户可搜索加密方案存在关键字陷门易遭受攻击的安全缺陷,在使用合数阶双线性对基础上提出一种多用户可搜索加密方案,并基于判定性子群假设和DBDH假设证明论文算法满足关键字陷门不可区分性的安全要求,可以抵御外部敌手选择关键字攻击。对比文献分析显示,在没有明显增加计算复杂度的前提下,提出的加密方案陷门尺寸及密文尺寸良好、安全性更高。 展开更多
关键词 可搜索加密 陷门 合数阶双线性对 多用户 无安全信道
下载PDF
儿童Trapdoor眼眶骨折14例临床分析 被引量:3
5
作者 刘桂琴 欧阳明 +3 位作者 朱远飞 蒋丽琼 周凤 乔元娇 《中国实用眼科杂志》 2016年第7期730-734,共5页
目的通过分析儿童Trapdoor眼眶骨折的临床资料,探讨儿童Trapdoor眼眶骨折的临床表现和治疗效果。方法对2008年1月至2015年1月在深圳市眼科医院确诊为儿童Trapdoor眼眶骨折的14例(14只眼)患儿的临床资料进行回顾性分析。结果14例Trapd... 目的通过分析儿童Trapdoor眼眶骨折的临床资料,探讨儿童Trapdoor眼眶骨折的临床表现和治疗效果。方法对2008年1月至2015年1月在深圳市眼科医院确诊为儿童Trapdoor眼眶骨折的14例(14只眼)患儿的临床资料进行回顾性分析。结果14例Trapdoor眼眶骨折的主要临床表现为垂直复视伴患眼上转受限(6/14),垂直复视伴患眼上转及下转受限(8/14),眼心反射(6/14),急性眼压升高(2/14)。单纯上转受限者牵拉试验5只眼弱阳性、1只眼阳性,上下转均受限者牵拉试验7只眼强阳性、1只眼弱阳性。CT表现为眶下壁眼球赤道后方眶下神经管内侧窄隙样骨折(14/14),下直肌箝闭于骨折处(7/14),下直肌肿胀、向骨折端旋转移位(6/14)。从受伤到就诊时间为4—30d,13例行眼眶骨折复位术,1例保守治疗治愈,手术距外伤时间为7—31d。6例单纯上转受限的患者复视完全消失、眼球运动恢复正常。7例上下转均受限的患者中,1例复视痊愈、3例部分好转、3例无明显好转。结论儿童患者出现垂直方向眼球运动障碍、眼心反射、急性眼压升高却没有眼球受伤表现时,通常为Trapdoor眼眶骨折。眼球上下转均受限伴牵拉试验强阳性是急诊手术的适应证,牵拉试验阳性或弱阳性者如果数天内眼球运动障碍无明显好转,则需尽早手术治疗。仅上转运动受限者较上下转运动均受限者预后好。 展开更多
关键词 trapdoor 爆裂性眼眶骨折 眼眶骨折 儿童
原文传递
31例儿童Trapdoor眼眶下壁骨折手术治疗的观察与分析 被引量:3
6
作者 吴婷 景作乾 +3 位作者 张瑞君 孙一洲 赵宁 钟一凡 《中国美容整形外科杂志》 CAS 2018年第1期52-54,共3页
目的分析儿童Trapdoor眼眶下壁骨折的特点和治疗方法。方法对31例Trapdoor眼眶下壁骨折患儿采用结膜切口入路行眼眶骨折整复术,根据骨缺损面积,27例植入可吸收眶板,4例未使用修复材料。术后指导患儿进行规律眼肌训练,随访12个月。记录... 目的分析儿童Trapdoor眼眶下壁骨折的特点和治疗方法。方法对31例Trapdoor眼眶下壁骨折患儿采用结膜切口入路行眼眶骨折整复术,根据骨缺损面积,27例植入可吸收眶板,4例未使用修复材料。术后指导患儿进行规律眼肌训练,随访12个月。记录患儿手术前后视功能、眼球运动情况、眼球突出度以及眼眶CT扫描结果。结果术后1个月时,受伤后5d内手术者治愈率为90.9%(10/11),5 d后手术者治愈率为65.0%(13/20);术后12个月时,受伤后5 d内手术者治愈率为90.9%(10/11),5 d后手术者治愈率为75.0%(15/20)。所有患儿术后无继发性睑内翻、下睑退缩、眶下神经麻痹发生,未发生植入物感染及排斥反应。结论儿童Trapdoor眼眶骨折确诊后应早期进行手术治疗,术中应用可吸收眶板修复眼眶下壁骨折安全、有效。 展开更多
关键词 爆裂性眼眶骨折 trapdoor 儿童 可吸收眶板
原文传递
基于理想格的可证明安全数字签名方案 被引量:5
7
作者 冯超逸 赵一鸣 《计算机工程》 CAS CSCD 北大核心 2017年第5期103-107,共5页
为确保签名算法在量子攻击下的安全性,现有的基于格的签名方案大部分都采用标准格结构下的困难性假设问题,而不是理想格,造成方案效率较低。为此,提出一种新的基于理想格上PLWE问题的数字签名方案。通过归约到PLWE问题,证明攻击者即使... 为确保签名算法在量子攻击下的安全性,现有的基于格的签名方案大部分都采用标准格结构下的困难性假设问题,而不是理想格,造成方案效率较低。为此,提出一种新的基于理想格上PLWE问题的数字签名方案。通过归约到PLWE问题,证明攻击者即使获取多个已有的消息和对应的签名,也无法对一个新的消息伪造出合法的签名。分析结果表明,与现有的基于标准格上陷门的数字签名方案相比,该方案的签名长度和公私钥长度均减少了约O(n)。 展开更多
关键词 数字签名 陷门 多项式环 安全性分析
下载PDF
Physics-based and data-driven modeling for stability evaluation of buried structures in natural clays 被引量:1
8
作者 Fengwen Lai Jim Shiau +3 位作者 Suraparb Keawsawasvong Fuquan Chen Rungkhun Banyong Sorawit Seehavong 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2023年第5期1248-1262,共15页
This study presents a hybrid framework to predict stability solutions of buried structures under active trapdoor conditions in natural clays with anisotropy and heterogeneity by combining physics-based and data-driven... This study presents a hybrid framework to predict stability solutions of buried structures under active trapdoor conditions in natural clays with anisotropy and heterogeneity by combining physics-based and data-driven modeling.Finite-element limit analysis(FELA)with a newly developed anisotropic undrained shear(AUS)failure criterion is used to identify the underlying active failure mechanisms as well as to develop a numerical(physics-based)database of stability numbers for both planar and circular trapdoors.Practical considerations are given for natural clays to three linearly increasing shear strengths in compression,extension,and direct simple shear in the AUS material model.The obtained numerical solutions are compared and validated with published solutions in the literature.A multivariate adaptive regression splines(MARS)algorithm is further utilized to learn the numerical solutions to act as fast FELA data-driven surrogates for stability evaluation.The current MARS-based modeling provides both relative importance index and accurate design equations that can be used with confidence by practitioners. 展开更多
关键词 Buried structures Natural clays Active trapdoor Undrained stability Multivariate adaptive regression splines (MARS) Finite element limit analysis(FELA)
下载PDF
不同PKG环境下可证安全的基于身份AKA协议 被引量:2
9
作者 夏松 权建校 韩文报 《电子与信息学报》 EI CSCD 北大核心 2010年第10期2393-2399,共7页
目前大多数基于身份认证密钥协商协议需要参与协议双方在同一个PKG环境下,而实际应用中需要在不同PKG环境下的用户之间也能进行安全通信。该文结合twin Diffie-Hellman问题提出了一个全新的不同PKG环境下的基于身份认证密钥协商协议。利... 目前大多数基于身份认证密钥协商协议需要参与协议双方在同一个PKG环境下,而实际应用中需要在不同PKG环境下的用户之间也能进行安全通信。该文结合twin Diffie-Hellman问题提出了一个全新的不同PKG环境下的基于身份认证密钥协商协议。利用Cash等人在2008年欧密会上提出的"trapdoor test"技术在eCK模型中将新协议的安全性规约到标准的CDH和BDH假设。 展开更多
关键词 密码学 认证密钥协商 基于身份 双线性对 不同PKG环境 trapdoor test技术
下载PDF
Underground storage tank blowout analysis:Stability prediction using an artificial neural network
10
作者 Nhat Tan Duong Van Qui Lai +2 位作者 Jim Shiau Rungkhun Banyong Suraparb Keawsawasvong 《Journal of Safety Science and Resilience》 EI CSCD 2023年第4期366-379,共14页
Most geotechnical stability research is linked to“active”failures,in which soil instability occurs due to soil self-weight and external surcharge applications.In contrast,research on passive failure is not common,as... Most geotechnical stability research is linked to“active”failures,in which soil instability occurs due to soil self-weight and external surcharge applications.In contrast,research on passive failure is not common,as it is predominately caused by external loads that act against the soil self-weight.An earlier active trapdoor stability investigation using the Terzaghi’s three stability factor approach was shown to be a feasible method for evaluating cohesive-frictional soil stability.Therefore,this technical note aims to expand“active”trapdoor research to assess drained circular trapdoor passive stability(blowout condition)in cohesive-frictional soil under axisymmetric conditions.Using numerical finite element limit analysis(FELA)simulations,soil cohesion,surcharge,and soil unit weight effects are considered using three stability factors(Fc,Fs,and Fγ),which are all associated with the cover-depth ratio and soil internal friction angle.Both upper-bound(UB)and lower-bound(LB)results are presented in design charts and tables,and the large dataset is further studied using an artificial neural network(ANN)as a predictive model to produce accurate design equations.The proposed passive trapdoor problem under axisymmetric conditions is significant when considering soil blowout stability owing to faulty underground storage tanks or pipelines with high internal pressures. 展开更多
关键词 BLOWOUT Passive stability trapdoor Stability factors Limit analysis
原文传递
An Attribute-Based Encryption Scheme Based on Unrecognizable Trapdoors 被引量:1
11
作者 Ruizhong Du Ailun Tan Junfeng Tian 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第5期579-588,共10页
Attribute-Based Encryption (ABE) has been widely used for ciphertext retrieval in the cloud environment.However,bi-flexible attribute control and privacy keywords are difficult problems that have yet to be solved.In t... Attribute-Based Encryption (ABE) has been widely used for ciphertext retrieval in the cloud environment.However,bi-flexible attribute control and privacy keywords are difficult problems that have yet to be solved.In this paper,we introduce the denial of access policy and the mutual matching algorithm of a dataset used to realize bidirectional control of attributes in the cloud server.To solve the problem of keyword privacy,we construct a security trapdoor by adding random numbers that effectively resist keyword guessing attacks from cloud servers and external attackers.System security is reduced to the Deterministic Bilinear Diffie-Hellman (DBDH) hypothesis problem.We validate our scheme through theoretical security analysis and experimental verification.Experiments are conducted on a real dataset,and results show that the scheme has higher security and retrieval efficiency than previous methods. 展开更多
关键词 Attribute-Based Encryption(ABE) unrecognizable trapdoor two-way access strategy ciphertext search
原文传递
鼻内镜辅助治疗儿童trapdoor眼眶骨折 被引量:1
12
作者 张群慧 于锋 +1 位作者 张浩亮 龚辉成 《中国耳鼻咽喉颅底外科杂志》 CAS 2015年第6期475-477,482,共4页
目的 探讨鼻内镜辅助治疗儿童trapdoor眼眶骨折的疗效。方法 2009年6月~2013年10月我院收治儿童trapdoor眼眶骨折12例,行鼻内镜辅助治疗儿童trapdoor眼眶骨折修复术,并术后随访。结果 12例患者,其中9例术后2周复视治愈,2例术后3~6个月... 目的 探讨鼻内镜辅助治疗儿童trapdoor眼眶骨折的疗效。方法 2009年6月~2013年10月我院收治儿童trapdoor眼眶骨折12例,行鼻内镜辅助治疗儿童trapdoor眼眶骨折修复术,并术后随访。结果 12例患者,其中9例术后2周复视治愈,2例术后3~6个月复视治愈,眼球上下转动均不受限,1例术后1年仍有中度复视,下直肌牵拉试验阳性。无其他严重眼部并发症,填充材料无排斥反应。术后CT检查见所有患者眼眶解剖结构恢复良好。结论 在鼻内镜辅助下行儿童trapdoor骨折修复,安全可靠,易于操作,是一种较为有效的手术方法。 展开更多
关键词 trapdoor 眼眶骨折 鼻内镜 儿童
下载PDF
AN EFFICIENT SIGNATURE SCHEME FROM CATALANO’S TRAPDOOR 被引量:1
13
作者 Wang Zhiwei 《Journal of Electronics(China)》 2010年第4期528-530,共3页
Digital signature is one of the most important cryptographic primitives. We proposed a new digital signature scheme based on Catalano’s trapdoor. Since Catalano’s trapdoor is more efficient than existing trapdoors i... Digital signature is one of the most important cryptographic primitives. We proposed a new digital signature scheme based on Catalano’s trapdoor. Since Catalano’s trapdoor is more efficient than existing trapdoors in number theory, our scheme need not modular exponentiation but several modular multiplications in the signing algorithm. We also proved our scheme is provably secure against adap-tively chosen message attack by using the Forking lemma. 展开更多
关键词 Digital signature Catalano’s trapdoor Random oracle Forking lemma
下载PDF
Constructing parallel long-message signcryption scheme from trapdoor permutation 被引量:1
14
作者 HU ZhenYu LIN DongDai +1 位作者 WU WenLing FENG DengGuo 《Science in China(Series F)》 2007年第1期82-98,共17页
A highly practical parallel signcrypUon scheme named PLSC from trapdoor permutations (TDPs for short) was built to perform long messages directly. The new scheme follows the Idea "scramble all, and encrypt small",... A highly practical parallel signcrypUon scheme named PLSC from trapdoor permutations (TDPs for short) was built to perform long messages directly. The new scheme follows the Idea "scramble all, and encrypt small", using some scrambling operation on message m along with the user's Identities, and then passing, In paraliel, small parts of the scrambling result through corresponding TOPs. This design enables the scheme to flexibly perform long messages of arbitrary length while avoid repeatedly invoking TDP operations such as the CBC mode, or verbosely black-box composing symmetric encryption and slgncryption, resulting in noticeable practical sevlngs in both message bandwidth and efficiency. Concretely, the signcryptlon scheme requires exactly one computation of the "receiver's TDP" (for "encryptlon") and one Inverse computation of the "sender's TDP" (for "authentication"), which Is of great practical significance in directly performing long messages, since the major bottleneck for many public encryptlon schemes is the excessive computational overhead of performing TDP operations. Cutting out the verbosely repeated padding, the newly proposed scheme Is more efficient than a black-box hybrid scheme. Most importantly, the proposed scheme has been proven to be tightly semanUcaiiy secure under adaptive chosen clphertext attacks (iND-CCA2) and to provide integrity of clphertext (INT-CTXT) as well as non-repudiation in the random oracle model. All of these security guarantees are provided in the full multi-user, insider-security setting. Moreover, though the scheme is designed to perform long messages, it may also be appropriate for settings where It is Impractical to perform large block of messages (i.e. extremely low memory environments such as smart cards). 展开更多
关键词 authenticated encryption SIGNCRYPTION trapdoor permutations PARALLEL
原文传递
One Construction of Chameleon All-But-One Trapdoor Functions
15
作者 许一栋 刘胜利 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期412-417,共6页
Chameleon all-but-one trapdoor functions(ABO-TDFs) were introduced by Lai et al. An important component of the existing constructions of chameleon ABO-TDFs based on the decisional Diffie-Hellman(DDH)assumption was the... Chameleon all-but-one trapdoor functions(ABO-TDFs) were introduced by Lai et al. An important component of the existing constructions of chameleon ABO-TDFs based on the decisional Diffie-Hellman(DDH)assumption was the chameleon hash functions. In this paper, we instantiate the first chameleon ABO-TDFs based on DDH free of chameleon hash functions. 展开更多
关键词 lossy trapdoor functions chameleon all-but-one trapdoor functions decisional Diffie-Hellman assumption
原文传递
Stability of active trapdoors in axisymmetry 被引量:2
16
作者 Suraparb Keawsawasvong Jim Shiau 《Underground Space》 SCIE EI 2022年第1期50-57,共8页
Trapdoor stability has been widely studied by many researchers in the field of tunneling engineering.A general question being fre-quently asked is that why most sinkholes have a near-perfect circular shape on the grou... Trapdoor stability has been widely studied by many researchers in the field of tunneling engineering.A general question being fre-quently asked is that why most sinkholes have a near-perfect circular shape on the ground surface.This could be possibly explained by the current numerical study using finite element limit analysis under axisymmetric condition,where upper and lower bound solutions of active circular trapdoors are determined.The failure study of sinkholes and the associated failure mechanisms in this paper are for non-homogeneous clay with a linear increase of strength with depth under various cover depth ratios and dimensionless strength gra-dients.A design equation for predicting the stability solutions is also developed based on the novel three dimensional solutions using axisymmetry. 展开更多
关键词 Numerical analysis AXISYMMETRY STABILITY trapdoor Active failure
原文传递
TUP: A New eCK-Secure AKE Protocol under the CDH Assumption
17
作者 Qinglei Zhou Zengfu Yang 《International Journal of Communications, Network and System Sciences》 2012年第6期332-336,共5页
The design and analysis of authenticated key exchange protocol is an important problem in information security area. At present, extended Canetti-Krawczyk (eCK) model provides the strongest definition of security for ... The design and analysis of authenticated key exchange protocol is an important problem in information security area. At present, extended Canetti-Krawczyk (eCK) model provides the strongest definition of security for two party key agreement protocol, however most of the current secure protocols can not be prove to secure without Gap assumption. To avoid this phenomenon, by using twinning key technology we propose a new two party key agreement protocol TUP which is obtained by modifying the UP protocol, then in conjunction with the trapdoor test, we prove strictly that the new protocol is secure in eCK model. Compared with previous protocols, the security assumption of new proposal is more standard and weaker, and it also solves an open problem in ProvSec'09. 展开更多
关键词 Authenticated Key Exchange Provable Security eCK Model Computational DIFFIE-HELLMAN ASSUMPTION trapdoor Test
下载PDF
Security Model for Preserving Privacy over Encrypted Cloud Computing
18
作者 Jassim R. Mlgheit Essam H. Houssein Hala H. Zayed 《Journal of Computer and Communications》 2017年第6期149-165,共17页
In our today’s life, it is obvious that cloud computing is one of the new and most important innovations in the field of information technology which constitutes the ground for speeding up the development in great si... In our today’s life, it is obvious that cloud computing is one of the new and most important innovations in the field of information technology which constitutes the ground for speeding up the development in great size storage of data as well as the processing and distribution of data on the largest scale. In other words, the most important interests of any data owner nowadays are related to all of the security as well as the privacy of data, especially in the case of outsourcing private data on a cloud server publicly which has not been one of the well-trusted and reliable domains. With the aim of avoiding any leakage or disclosure of information, we will encrypt any information important or confidential prior to being uploaded to the server and this may lead to an obstacle which encounters any attempt to support any efficient keyword query to be and ranked with matching results on such encrypted data. Recent researches conducted in this area have focused on a single keyword query with no proper ranking scheme in hand. In this paper, we will propose a new model called Secure Model for Preserving Privacy Over Encrypted Cloud Computing (SPEC) to improve the performance of cloud computing and to safeguard privacy of data in comparison to the results of previous researches in regard to accuracy, privacy, security, key generation, storage capacity as well as trapdoor, index generation, index encryption, index update, and finally files retrieval depending on access frequency. 展开更多
关键词 CLOUD Computing Multi-Keyword QUERY Ranked QUERY trapdoor PRIVACY PRESERVING Encrypted CLOUD Data Top-K QUERY CLOUD Security
下载PDF
Repeated Hemorrhage after Repair of Orbital Floor Fracture with a Silicone Implant
19
作者 Hirohiko Kakizaki Akihiro Ichinose +3 位作者 Yasuhiro Takahashi Nobutada Katori Alejandra A. Valenzuela Masayoshi Iwaki 《Surgical Science》 2011年第8期414-417,共4页
A 16-year-old girl was accidentally kicked in her right eye by her cheerleading teammate in an exercise. Upward gaze ability of her right eye was severely impaired and computed tomography (CT) showed a trapdoor fractu... A 16-year-old girl was accidentally kicked in her right eye by her cheerleading teammate in an exercise. Upward gaze ability of her right eye was severely impaired and computed tomography (CT) showed a trapdoor fracture of the right orbital floor. After surgical exploration, a silicone implant was inserted. No bleeding was confirmed at this time. The next day, CT detected a hematoma on the right orbital floor. The hematoma was drained and meticulous cautery was used to control any potential bleeding. The same silicone implant was re-inserted. Irrespective of attempts to avoid hemorrhage, this occurred twice after the respective evacuations. During a fourth operation, we removed the silicone implant simultaneously with hematoma evacuation. No hematoma has occurred since, and the patient’s ocular movement has dramatically improved to a normal binocular single vision field. When repeated hemorrhages occur after an orbital floor fracture repair with insertion of a silicone implant, removal of the implant is an effective strategy to resolve the hemorrhage. 展开更多
关键词 trapdoor Fracture ORBITAL Floor SILICONE IMPLANT HEMATOMA HEMORRHAGE Removal
下载PDF
Authenticated Key Agreement Protocols: A Comparative Study
20
作者 Areej Omar Baalghusun Olfa Fahad Abusalem +1 位作者 Zahra Abbas Al Abbas Jayaprakash Kar 《Journal of Information Security》 2015年第1期51-58,共8页
One of the most important and challenging cryptographic primitives in Public Key Cryptography is Key Agreement Protocol where two or more parties share secret values and establish the session key. Many authors have pr... One of the most important and challenging cryptographic primitives in Public Key Cryptography is Key Agreement Protocol where two or more parties share secret values and establish the session key. Many authors have proposed key agreement protocols. In this article, we have viewed some authenticated Key Agreement Protocols and presented a comparative study. We have also described the design principle, security requirement and various attacks on Key Agreement Protocol. 展开更多
关键词 Impersonation RESILIENCE PRIME FACTORIZATION ECDLP trapdoor Function
下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部