搜索结果: 1-3 共查到“军事学 legacy”相关记录3条 . 查询时间(0.38 秒)
Bitcontracts: Adding Expressive Smart Contracts to Legacy Cryptocurrencies
Blockchain Smart Contracts Cryptocurrency
2019/7/24
In contrast to traditional contracts, cryptocurrency-based smart contracts can provide improved business automation and more transparency. However, not all cryptocurrencies support expressive contract...
HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data
Historical Data Authentication Authenticated Key Exchange
2019/5/9
In this paper, we introduce two lightweight historical data based multi-factor authenticated key exchange (HMAKE) protocols in the random oracle model. Our HMAKE protocols use a symmetric secret key, ...
Cyber and Physical Access Control in Legacy System Using Passwords
Password Management Visual Cryptography Mobile Device
2015/12/18
Passwords—secret combinations of symbols—play an important role in
physical world security (e.g. watchword to prevent unauthorized entry into military
forbidden area) from ancient times. With emerge...