نتایج جستجو برای: secure sets
تعداد نتایج: 266654 فیلتر نتایج به سال:
Predicate encryption is a recent generalization of identitybased encryption (IBE), broadcast encryption, attribute-based encryption, and more. A natural question is whether there exist black-box constructions of predicate encryption based on generic building blocks, e.g., trapdoor permutations. Boneh et al. (FOCS 2008) recently gave a negative answer for the specific case of IBE. We show both n...
Fuzzy Sets and Systems 161 (2010) 412-432 Elsevier www.elsevier.com/locate/fss A Categorical Semantics for Fuzzy Predicate Logic
does not satisfy (EP), because for x = 0.3, y = 0.5 and z = 0.5 we get I (x, I (y, z)) = 0.7 = 0.5 = I (y, I (x, z)). The corrected last two rows are provided in Table 1 here. In both of these cases the natural negation NI is the classical negation NC(x) = 1 − x. One can easily check that the first function satisfies (I1) and it does not satisfy (EP), because for x = 0.3, y = 1 and z = 0, we ge...
In this work we solve an open problem of U.Höhle [Problem 11, Fuzzy Sets and Systems 145 (2004) 471-479]. We show that the solution gives a characterization of all conditionally cancellative t-subnorms. Further, we give an equivalence condition for a conditionally cancellativite t-subnorm to be a t-norm and hence show that conditionally cancellativite t-subnorms whose natural negations are stro...
The present study examined three sets of questions about secure base provision in the context of the family, including (1) relations between inter-parental perceptions of secure base provision and parents' adult romantic attachment and marital satisfaction, (2) interrelations among family members' perception of secure base provision, and (3) links between both adolescents' and parents' percepti...
In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private set intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about compone...
Cryptography is the science of secure computation and communication. The scope of cryptosystems, nowadays, ranges from private-key encryption and authentication to more complex systems such as publickey encryption, electronic voting, secure multi-party computation on large data sets, etc. My specialization is in foundations of cryptography, a field that aims at designing cryptographic protocols...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید