搜索结果: 1-15 共查到“军事学 N management”相关记录36条 . 查询时间(0.176 秒)
A Machine-Checked Proof of Security for AWS Key Management Service
Provable-Security Machine-Checked Proof Key Management
font style='font-size:12px;'>
2019/9/19
We present a machine-checked proof of security for the domain management protocol of Amazon Web Services' KMS (Key Management Service) a critical security service used throughout AWS and by AWS custom...
A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management
Group Signatures Anonymity Revocation
font style='font-size:12px;'>
2019/1/26
Group signatures are signatures providing signer anonymity where signers can produce signatures on behalf of the group that they belong to. Although such anonymity is quite attractive considering priv...
Threshold Partially-Oblivious PRFs with Applications to Key Management
Oblivious PRF Key Management
font style='font-size:12px;'>
2018/8/10
An Oblivious PRF (OPRF) is a protocol between a server holding a key to a PRF and a user holding an input. At the end of the interaction, the user learns the output of the OPRF on its input and nothin...
Distributed SSH Key Management with Proactive RSA Threshold Signatures
distributed cryptography implementation RSA secret sharing
font style='font-size:12px;'>
2018/5/2
SSH is a security network protocol that uses public key cryptography for client authentication. SSH connections are designed to be run between a client and a server and therefore in enterprise network...
The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications
Vehicular communications security and privacy pseudonym certificates
font style='font-size:12px;'>
2018/1/29
Security and privacy are important requirements for the broad deployment of intelligent transportation systems (ITS). This motivated the development of many proposals aimed at creating a Vehicular Pub...
Weak-Unforgeable Tags for Secure Supply Chain Management
light-weight cryptography unforgeability One-time Hash function
font style='font-size:12px;'>
2017/12/25
Given the value of imported counterfeit and pirated goods, the need for secure supply chain management is pertinent. Maleki et al. (HOST 2017) propose a new management scheme based on RFID tags (with ...
A New Digital Rights Management Solution Based on White-Box Cryptography
digital rights management white-box cryptography
font style='font-size:12px;'>
2017/10/16
Digital rights management is an important technique to protect digital contents from abuse. Usually it is confronted with severe challenges because of the untrusted environment its application execute...
Binary Hash Tree based Certificate Access Management
Binary tree certificate access management
font style='font-size:12px;'>
2017/8/10
We present a certificate access management system to support the USDOT's proposed rule on Vehicle-to-Vehicle (V2V) communications, Federal Motor Vehicle Safety Standard (FMVSS) No.~150. Our proposal, ...
State Management for Hash Based Signatures
public-key cryptography digital signatures
font style='font-size:12px;'>
2016/4/12
The unavoidable transition to post-quantum cryptography requires mature quantum-safe digital signature schemes. Hash-based signatures are well-understood and promising candidates. A common concern reg...
Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events
applied cryptography bitcoin key management
font style='font-size:12px;'>
2016/1/6
In this paper we study the question of key management and
practical operational security in bitcoin digital currency storage systems.
We study the security two most used bitcoin HD Wallet key manage...
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems
Trust Management USB Storage Device Industrial Control System
font style='font-size:12px;'>
2016/1/5
The security of sensitive data and the safety of control signal
are two core issues in industrial control system (ICS). However, the prevalence
of USB storage devices brings a great challenge on pro...
Security Analysis of Niu et al. Authentication and Ownership Management Protocol
RFID ownership transfer ownership delegation
font style='font-size:12px;'>
2015/12/29
Over the past decade, besides authentication, ownership management protocols have been suggested to transfer or delegate the ownership of RFID tagged items. Recently, Niu et al. have proposed an authe...
Smart Security Management in Secure Devices
Hardware tamper resistance Countermeasures against fault and side-channel attacks Architectures and implementations
font style='font-size:12px;'>
2015/12/29
Among other threats, secure components are subjected to
physical attacks whose aim is to recover the secret information they
store. Most of the work carried out to protect these components generally...
PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management
Physical Unclonable Function Key Management Forward Security
font style='font-size:12px;'>
2015/12/21
PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management.
Distributed Group Authentication for RFID Supply Management
grouping-proofs modularity
font style='font-size:12px;'>
2014/3/5
We investigate an application of Radio Frequency Identification (RFID) referred to in the literature as group scanning, in which an RFID reader device interrogates several RFID tags to establish “simu...