搜索结果: 1-4 共查到“军事学 Principle”相关记录4条 . 查询时间(0.031 秒)
Secure Two-Party Computation with Fairness -- A Necessary Design Principle
secure computation fairness definitions of security
2017/9/28
Protocols for secure two-party computation enable a pair of mutually distrustful parties to carry out a joint computation of their private inputs without revealing anything but the output. One importa...
Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware
Malware Detection Provable Security Attestation
2015/12/24
Protecting software from malware injection is the holy grail
of modern computer security. Despite intensive efforts by
the scientific and engineering community, the number of successful
attacks con...
A Principle for Cryptographic Protocols Beyond Security,Less Parameters
Cryptographic Protocols Security Less Parameters
2010/2/1
Almost cryptographic protocols are presented with security arguments.
None of them, however, did explain why a protocol should like this, not like that. The
reason of the phenomenon is that there ar...
The Design Principle of Hash Function with Merkle-Damgºard Construction
Hash Function Block Cipher Merkle-Damgº ard Construction
2008/11/14
The paper discusses the security of compression function and
hash function with Merkle-Damgºard construction and provides the com-
plexity bound of ¯nding a collision and primage of hash f...