Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

3 4 5 6 7
zadetkov: 235
41.
  • Information Theoretical Analysis of Side-Channel Attacks to the Shannon Cipher System
    Oohama, Yasutada; Santoso, Bagus 2018 IEEE International Symposium on Information Theory (ISIT), 06/2018
    Conference Proceeding

    We study side-channel attacks for the Shannon cipher system. To pose side channel-attacks to the Shannon cipher system, we regard them as a signal estimation via encoded data from two distributed ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
42.
  • Close Dominance Graph: An E... Close Dominance Graph: An Efficient Framework for Answering Continuous Top- k Dominating Queries
    Santoso, Bagus Jati; Ge-Ming Chiu IEEE transactions on knowledge and data engineering, 08/2014, Letnik: 26, Številka: 8
    Journal Article
    Recenzirano

    There are two preference-based queries commonly used in database systems: (1) top-k query and (2) skyline query. By combining the ranking rule used in top-\(k\) query and the notion of dominance ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
43.
  • Factorization of Square-Fre... Factorization of Square-Free Integers with High Bits Known
    SANTOSO, Bagus; KUNIHIRO, Noboru; KANAYAMA, Naoki ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2008/01/01, 2008-01-01, Letnik: E91.A, Številka: 1
    Journal Article
    Recenzirano

    In this paper we propose an algorithm of factoring any integer N which has k different prime factors with the same bit-length, when about (1/k+2+ε/k-1)log2N high-order bits of each prime factor are ...
Celotno besedilo
Dostopno za: NUK, UL, UM
44.
  • Universal Coding for Shannon Ciphers under Side-Channel Attacks
    Oohama, Yasutada; Santoso, Bagus arXiv (Cornell University), 05/2024
    Paper, Journal Article
    Odprti dostop

    We study the universal coding under side-channel attacks posed and investigated by Oohama and Santoso (2022). They proposed a theoretical security model for Shannon cipher system under side-channel ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
45.
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
46.
  • On Feasibility of Ultracapacitor Full Electric Transit Bus for Jakarta, Indonesia
    Lystianingrum, Vita; Irawan, Andi; Bagus Santoso, Ilham ... 2021 International Conference on Technology and Policy in Energy and Electric Power (ICT-PEP), 2021-Sept.-29
    Conference Proceeding

    Electric vehicles (EVs) and its technology, including the EVs storage system are getting the attention in the last decade. So far, batteries have been the most common storage type for EVs. However, ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
47.
  • UPAYA PAKSA (DWANG MIDDELEN... UPAYA PAKSA (DWANG MIDDELEN) DALAM DUGAAN TERJADINYA TINDAK PIDANA BAGI PENYIDIK
    Santoso, Bagus Teguh MIMBAR YUSTITIA, 11/2022, Letnik: 6, Številka: 1
    Journal Article

    The supreme court didn’t make the gradation on the evidence law in the process of the law enforcement on the first stage/pre-trial (investigation and introgation) and the second stage/trial ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
48.
  • New Distributed Source Encryption Framework
    Oohama, Yasutada; Santoso, Bagus arXiv (Cornell University), 08/2022
    Paper, Journal Article
    Odprti dostop

    We pose and investigate the distributed secure source coding based on the common key cryptosystem. This cryptosystem includes the secrecy amplification problem for distributed encrypted sources with ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
49.
  • Strong Converse Theorem for Source Encryption under Side-Channel Attacks
    Oohama, Yasutada; Santoso, Bagus arXiv (Cornell University), 02/2022
    Paper, Journal Article
    Odprti dostop

    We are interested in investigating the security of source encryption with a symmetric key under side-channel attacks. In this paper, we propose a general framework of source encryption with a ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
50.
  • Strong Converse for Distributed Source Coding with Encryption Using Correlated Keys
    Oohama, Yasutada; Santoso, Bagus 2021 IEEE Information Theory Workshop (ITW), 2021-Oct.-17
    Conference Proceeding

    We pose and investigate the distributed secure source coding based on the common key cryptosystem. This cryptosystem includes the secrecy amplification problem for distributed encrypted sources with ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
3 4 5 6 7
zadetkov: 235

Nalaganje filtrov