搜索结果: 1-8 共查到“军事学 secure communication”相关记录8条 . 查询时间(0.078 秒)
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC
applied cryptography provable security TLS
font style='font-size:12px;'>
2019/4/29
Secure channel establishment protocols such as TLS are some of the most important cryptographic protocols, enabling the encryption of Internet traffic. Reducing the latency (the number of interactions...
A PUF-based Secure Communication Protocol for IoT
PUF cryptographic protocols
font style='font-size:12px;'>
2016/7/7
Security features are of paramount importance for IoT, and implementations are challenging given the resource-constrained IoT set-up. We have developed a lightweight identity-based cryptosystem suitab...
T-Proof: Secure Communication via Non-Algorithmic Randomization
identity theft non-repeat identification dialogue
font style='font-size:12px;'>
2016/5/20
shared random strings are either communicated or recreated algorithmically in “pseudo” mode, thereby exhibiting innate vulnerability. Proposing a secure protocol based on unshared randomized data, whi...
Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines
reverse firewalls exfiltration secure message transmission
font style='font-size:12px;'>
2015/12/30
A secure reverse firewall, as recently defined by Mironov and Stephens-Davidowitz, is a
third party that “sits between a user and the outside world” and modifies the user’s sent and received
message...
Enabling End-to-End Secure Communication with Anonymous and Mobile Receivers - an Attribute-Based Messaging Approach
attribute-based encryption attribute-based messaging
font style='font-size:12px;'>
2014/3/11
Mechanisms for secure mobile communication can be enablers for novel applications in the area of cooperative work. In this context, this article exemplarily investigates an emergency management settin...
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary
Perfect Reliability Information Theoretic Security Static and Mobile Mixed Adversary
font style='font-size:12px;'>
2009/6/5
In the problem of perfectly reliable message transmission (PRMT), a sender S and a
receiver R are connected by n bidirectional synchronous channels. A mixed adversary
A(tb;tf ;tp) with infinite comp...
Efficient Perfectly Reliable and Secure Communication Tolerating Mobile Adversary
Information Theoretic Security Communication Efficiency Mobile Adversary
font style='font-size:12px;'>
2009/6/3
We study the problem of Perfectly Reliable Message Transmission (PRMT) and Perfectly
Secure Message Transmission (PSMT) between two nodes S and R in an undirected synchronous
network, a part of whic...
Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks
Ad-hoc network Anonymity Routing
font style='font-size:12px;'>
2008/12/19
The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ...