搜索结果: 1-15 共查到“军队指挥学 internet”相关记录35条 . 查询时间(0.09 秒)
Cryptanalysis of an Ultra lightweight Authentication Scheme based on Permutation Matrix Encryption for Internet of Vehicles
IoV security analysis matrix encryption
2019/7/23
Internet of Things (IoT) has various applications such as healthcare, supply chain, agriculture, etc. Using the Internet of Vehicles(IoV) to control traffic of the cities is one of the IoT application...
Towards Forward Secure Internet Traffic
cryptographic protocols applied cryptography key exchange
2019/7/17
Forward Secrecy (FS) is a security property in key-exchange algorithms which guarantees that a compromise in the secrecy of a long-term private-key does not compromise the secrecy of past session keys...
The basic concept behind the emergence of Internet of Things (IoT) is to connect as many objects to the Internet as possible in an attempt to make our lives better in some way. However, connecting eve...
Fast Secure Computation for Small Population over the Internet
Secure Multiparty Computation Fairness Guaranteed Output Delivery
2018/8/2
Secure Multi-Party Computation (MPC) with small number of parties is an interesting area of research, primarily due to its ability to model most real-life MPC applications and the simplicity and effic...
CHARIOT: Cloud-Assisted Access Control for the Internet of Things
access control cloud computing Internet of Things
2018/6/27
The Internet of Things (IoT) technology has expanded widely across the world, promising new data management opportunities for industries, companies and individuals in different sectors, such as health...
A Secure User Authentication and Key Agreement Scheme for HWSN Tailored for the Internet of Things Environment
Internet of Things Wireless Sensor Networks Vulnerability
2017/6/22
Internet of things (IOT) is the term used to describe a world in which the things interact with other things through internet connection or communication means, share the information together and or p...
Voting systems have been around for hundreds of years and despite different views on their integrity, have always been deemed secure with some fundamental security and anonymity principles. Numerous e...
Privacy-Preserving Interdomain Routing at Internet Scale
BGP secure multi-party computation
2017/5/11
The Border Gateway Protocol (BGP) computes routes between the organizational networks that make up today's Internet. Unfortunately, BGP suffers from deficiencies, including slow convergence, security ...
Homomorphic Tallying for the Estonian Internet Voting System
cryptographic protocols Estonian Internet Voting System
2016/12/10
In this paper we study the feasibility of using homomorphic tallying in the
Estonian Internet voting system. The paper analyzes the security benefits provided
by homomorphic tallying, the costs intr...
Passive Secret Disclosure Attack on an Ultralightweight Authentication Protocol for Internet of Things
RFID Secret Disclosure Authentication
2016/12/10
Recently, Tewari and Gupta have proposed an ultralightweight RFID authentication protocol. In this paper, we consider the security of the proposed protocol and present a passive secret disclosure atta...
Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project
post-quantum cryptography key exchange implementation
2016/12/8
Designing public key cryptosystems that resist attacks by quantum computers is an important area of current cryptographic research and standardization. To retain confidentiality of today's communicati...
Apollo - End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation
cryptographic protocols evoting
2016/12/7
We present security vulnerabilities in the remote voting system Helios. We propose Apollo, a modified version of Helios, which addresses these vulnerabilities and could improve the feasibility of inte...
Optimizing Semi-Honest Secure Multiparty Computation for the Internet
secure multiparty computation semi-honest adversaries constant-round protocols
2016/12/7
In the setting of secure multiparty computation, a set of parties with private inputs wish to compute some function of their inputs without revealing anything but their output. Over the last decade, t...
It is common knowledge that RSA can fail when used with weak random number generators. In this paper we present two algorithms that we used to find vulnerable public keys together with a simple proced...
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
user authentication key agreement cryptanalysis
2016/1/27
Recently, Farasha et al. proposed an efficient user authentication and key
agreement scheme for heterogeneous wireless sensor network tailored for the Internet
of Things environment. By using BAN-lo...