搜索结果: 1-15 共查到“军事学 Ad Hoc”相关记录39条 . 查询时间(0.093 秒)
Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks
Vehicular ad hoc networks (VANETs) Impersonation attack Bogus message attack
2019/5/13
Protecting a driver’s privacy is one of the major concerns in vehicular ad hoc networks (VANETs). Currently, Azees et al. has proposed an efficient anonymous authentication protocol (EAAP) for VANETs....
Ad Hoc Multi-Input Functional Encryption
cryptographic protocols multi input functional encryption
2019/4/8
Consider sources that supply sensitive data to an aggregator. Standard encryption only hides the data from eavesdroppers, but using specialized encryption one can hope to hide the data (to the extent ...
Turning HATE Into LOVE: Homomorphic Ad Hoc Threshold Encryption for Scalable MPC
MPC threshold encryption obfuscation
2018/11/5
We explore large-scale fault-tolerant multiparty computation on a minimal communication graph. Our goal is to be able to privately aggregate data from thousands of users - for example, in order to obt...
Ad Hoc PSM Protocols: Secure Computation Without Coordination
Secure Computation Information-Theoretic Security Obfuscation
2017/2/21
We study the notion of {\em ad hoc secure computation}, recently introduced by Beimel et al. (ITCS 2016), in the context of the {\em Private Simultaneous Messages} (PSM) model of Feige et al.\ (STOC 2...
Proxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security Analysis and an Efficient Scheme
cryptographic protocols privacy requirements
2016/12/10
In vehicular ad hoc networks, message authentication using proxy vehicles was proposed to reduce the computational overhead of roadside unites. In this type of message authentication schemes, proxy ve...
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
secure computation smart cards implementation
2016/1/9
Secure two-party computation allows two mutually distrusting parties to jointly compute an arbitrary function on their private inputs without revealing anything but the result. An interesting target f...
Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network
secret-key cryptography / Key Exchange MANET routing
2012/3/28
Mobile Ad-hoc Network (MANET) is a transitory and infrastructureless network supported by no fixed trusted infrastructure. To achieve security goals like: authentication, integrity, non-repudiation, p...
Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network
secret-key cryptography / Key Exchange MANET routing
2011/6/8
Mobile Ad-hoc Network (MANET) is a transitory and infrastructureless network supported by no fixed trusted infrastructure. To achieve security goals like: authentication, integrity, non-repudiation, p...
A secure anonymous communication scheme in vehicular ad hoc networks frompairings
Anonymous communication protocol bilinear pairings ID-based cryptosystem
2010/2/1
Security and efficiency are two crucial issues in vehicular ad hoc networks.
Many researches have devoted to these issues. However, we found that most of the
proposed protocols in this area are inse...
A NEW MESSAGE RECOGNITION PROTOCOL FOR AD HOC PERVASIVE NETWORKS
Message Recognition Protocol Ad Hoc Pervasive Networks
2009/6/5
We propose a message recognition protocol which is suitable for ad hoc pervasive
networks without the use of hash chains. Hence, we no longer require the sensor motes to save
values of a hash chain ...
Cryptanalysis of Bohio et al.’s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks
IBBSC Scheme Wireless Ad-hoc Networks
2009/6/5
Broadcast signcryption enables the broadcaster to simultaneously
encrypt and sign the content meant for a specific
set of users in a single logical step. It provides a very efficient
solution to th...
We examine the problem of message and entity recognition in the context of ad hoc
networks. We review the definitions and the security model described in the literature and examine
previous recognit...
Threshold RSA for Dynamic and Ad-Hoc Groups
Threshold RSA Dynamic and Ad-Hoc Groups mobile ad-hoc networks
2009/6/2
We consider the use of threshold signatures in ad-hoc and dynamic groups such as MANETs
(“mobile ad-hoc networks”). While the known threshold RSA signature schemes have several properties
that make...
一种无证书Ad hoc密钥管理与认证模型
Ad hoc网络 密钥管理 认证
2009/5/26
设计了一种用于Ad hoc网络的新密钥管理与认证模型.该模型应用椭圆曲线组合公钥技术,仅在密钥初始化阶段需要可信认证中心的支持.在网络运行阶段,应用门限密码技术实现了自组织的节点公私密钥对更新和撤销,以及共享私钥种子矩阵更新.设计了一种认证与密钥协商协议,协议中用计算的方法产生公钥,减少了两次证书传递过程和验证运算.相比基于证书和基于身份的模型,新模型的安全性、灵活性和效率更高,适合Ad hoc网...
Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks
Mobile ad hoc networks secure routing provable security
2009/3/27
Routing is one of the most basic networking functions in mobile ad hoc networks. Hence,
an adversary can easily paralyze the operation of the network by attacking the routing protocol.
This has been...