搜索结果: 1-15 共查到“distance”相关记录457条 . 查询时间(0.093 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Best subset selection via distance covariance
距离协方差 最佳子集 回归分析
2023/4/14
China starts building long-distance nuclear heating pipeline(图)
long-distance nuclear heating pipeline China
2023/3/7
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Bayesian Approach to Determining the Orientation of Sound-soft Obstacles with Phaseless Data via Wasserstein Distance
Wasserstein距离 贝叶斯方法 无相数据 软声障碍物
2023/4/27
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Model-free conditional screening for ultrahigh-dimensional survival data via conditional distance correlation
条件距离 相关性 超高维 生存数据 无模型 条件筛选
2023/5/4
A long-distance connection:Polar climate affects trade wind strength in tropics(图)
long-distance connection Polar climate trade wind strength tropics
2020/12/11
It has long been recognized that variations in sea surface temperature in the tropical Pacific affect global climate. The episodic warming of the tropical Pacific during El Niño events causes the...
Xylem-based long-distance transport and phloem remobilization of copper inSalix integraThunb
Xylem-based long-distance transport phloem remobilization Salix
2023/6/5
Lattice Gaussian Sampling by Markov Chain Monte Carlo: Bounded Distance Decoding and Trapdoor Sampling
lattice Gaussian sampling Markov chain Monte Carlo bounded distance decoding
2019/6/5
Sampling from the lattice Gaussian distribution plays an important role in various research fields. In this paper, the Markov chain Monte Carlo (MCMC)-based sampling technique is advanced in several f...
Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems
Program Obfuscation Hamming Distance Conjunctions
2019/6/4
We consider the problem of obfuscating programs for fuzzy matching (in other words, testing whether the Hamming distance between an nn-bit input and a fixed nn-bit target vector is smaller than some p...
A Modified Simple Substitution Cipher With Unbounded Unicity Distance
finite-key unicity randomization
2019/6/4
The classic simple substitution cipher is modified by randomly inserting key-defined noise characters into the ciphertext in encryption which are ignored in decryption. Interestingly, this yields a fi...
Implementation-Level Corruptions in Distance Bounding -- Exhibiting Faults and Provably-Secure Fixes in the Electronic Payment Protocol PayPass --
cryptographic protocols white-box
2019/1/2
In relay attacks,a man-in-the-middle attacker gains access to a service by relaying the messages between two legitimate parties. Distance-bounding protocols are a countermeasure to relay attacks, wher...
Instant Privacy-Preserving Biometric Authentication for Hamming Distance
privacy-preserving biometric authentication inner product encryption learning with errors
2018/12/24
In recent years, there has been enormous research attention in privacy-preserving biometric authentication, which enables a user to verify him or herself to a server without disclosing raw biometric i...
A distance bounding (DB) protocol is a two-party authentication protocol between a prover and a verifier which is based on the distance between the prover and the verifier. It aims to defeat threats b...
Another Look at Relay and Distance-based Attacks in Contactless Payments
Contactless Payments EMV-adaptations
2018/5/3
Relay attacks on contactless e-payments were demonstrated in 2015. Since, countermeasures have been proposed and Mastercard has recently adopted a variant of these in their specifications. These relay...
Fine-Grained and Application-Ready Distance-Bounding Security
DB-security properties DB protocols
2018/5/2
Distance-bounding (DB) protocols are being adopted in different applications, e.g., contactless payments, keyless entries. For DB to be application-ready, "pick-and-choose" corruption models and clear...