搜索结果: 1-7 共查到“军事学 hop”相关记录7条 . 查询时间(0.031 秒)
Multi-Hop Locks for Secure, Privacy-Preserving and Interoperable Payment-Channel Networks
smart contracts security privacy interoperability
font style='font-size:12px;'>
2018/5/28
Tremendous growth in the cryptocurrency usage is exposing the inherent scalabilty issues with the permissionless blockchain technology. Among few alternatives, payment-channel networks (PCNs) have eme...
Batched Multi-hop Multi-key FHE from ring-LWE with Compact Ciphertext Extension
multikey FHE batching BGV FHE
font style='font-size:12px;'>
2017/9/25
Traditional fully homomorphic encryption (FHE) schemes support computation on data encrypted under a single key. In STOC 2012, López-Alt et al. introduced the notion of multi-key FHE (MKFHE), which al...
Multi-Hop Distance Estimation: How Far are You?
Distance-Bounding Distance-Estimation
font style='font-size:12px;'>
2017/7/26
Several access control systems are based on the users’ physical location/proximity to the access point. Distance- Bounding (DB) protocols constitute a classical solution to calculate the distance betw...
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices
re-encryption average-case obfuscation
font style='font-size:12px;'>
2015/12/30
In this work we define multiple relaxations to the definition of
correctness in secure obfuscation. While still remaining meaningful, these
relaxations provide ways to obfuscate many primitives in a...
Framework for Security Proofs for On-demand Routing Protocols in Multi-Hop Wireless Networks
cryptographic protocols
font style='font-size:12px;'>
2012/3/28
We present a framework for security proofs for on-demand routing protocols. The framework relies on the composable cryptographic library by Backes, Pfitzmann and Waidner (BPW). The idea is to break do...
Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks
End-by-Hop Protocol Secure Aggregation Sensor Networks
font style='font-size:12px;'>
2009/6/23
In order to save bandwidth and thus battery power, sensor network measurements
are sometimes aggregated en-route while being reported back to the querying server. Authentication
of the measurements ...
Provisioning Protected Resource Sharing in Multi-Hop Wireless Networks
Provisioning Protected Resource Sharing Multi-Hop Wireless Networks
font style='font-size:12px;'>
2008/12/26
We propose a protection framework for resource sharing to promote cooperation among
nodes in multi-hop wireless networks. In the resource sharing protocol, a node claims credits
when it relays other...