搜索结果: 1-5 共查到“军队指挥学 Entity Authentication”相关记录5条 . 查询时间(0.046 秒)
A Survey on Lightweight Entity Authentication with Strong PUFs
physically unclonable function entity authentication lightweight
font style='font-size:12px;'>
2016/1/5
Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations
of an integrated circuit (IC). Their input-output behavior serves as a unique IC ‘fingerprint’. Therefore,
the...
Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication
public-key cryptography anonymity
font style='font-size:12px;'>
2013/4/18
We are witnessing the rapid expansion of smart devices in our daily life. The need for individual privacy protection calls for anonymous entity authentication techniques with affordable efficiency upo...
Secure and Efficient HB-CM Entity Authentication Protocol
HB-CM Entity Authentication Protocol HB-CM− protocol GRS attack
font style='font-size:12px;'>
2009/9/27
The simple, computationally efficient LPN-based HB-like entity
authentication protocols have attracted a great deal of attention in
the past few years due to the broad application prospect in low-co...
Secure and Efficient HB-CM Entity Authentication Protocol
Secure Efficient HB-CM Entity Authentication Protocol
font style='font-size:12px;'>
2009/9/22
The simple, computationally efficient LPN-based HB-like entity
authentication protocols have attracted a great deal of attention in
the past few years due to the broad application prospect in low-co...
Entity Authentication Schemes Using Braid Word Reduction
braid group authentication zero knowledge handle reduction
font style='font-size:12px;'>
2009/4/15
Artin’s braid groups currently provide a promising background for cryptographical
applications, since the first cryptosystems using braids were introduced in
[2, 3, 18] (see also [22]). A variety of...