搜索结果: 1-8 共查到“军队指挥学 secure communication”相关记录8条 . 查询时间(0.093 秒)
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC
applied cryptography provable security TLS
2019/4/29
Secure channel establishment protocols such as TLS are some of the most important cryptographic protocols, enabling the encryption of Internet traffic. Reducing the latency (the number of interactions...
Security features are of paramount importance for IoT, and implementations are challenging given the resource-constrained IoT set-up. We have developed a lightweight identity-based cryptosystem suitab...
T-Proof: Secure Communication via Non-Algorithmic Randomization
identity theft non-repeat identification dialogue
2016/5/20
shared random strings are either communicated or recreated algorithmically in “pseudo” mode, thereby exhibiting innate vulnerability. Proposing a secure protocol based on unshared randomized data, whi...
Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines
reverse firewalls exfiltration secure message transmission
2015/12/30
A secure reverse firewall, as recently defined by Mironov and Stephens-Davidowitz, is a
third party that “sits between a user and the outside world” and modifies the user’s sent and received
message...
Enabling End-to-End Secure Communication with Anonymous and Mobile Receivers - an Attribute-Based Messaging Approach
attribute-based encryption attribute-based messaging
2014/3/11
Mechanisms for secure mobile communication can be enablers for novel applications in the area of cooperative work. In this context, this article exemplarily investigates an emergency management settin...
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary
Perfect Reliability Information Theoretic Security Static and Mobile Mixed Adversary
2009/6/5
In the problem of perfectly reliable message transmission (PRMT), a sender S and a
receiver R are connected by n bidirectional synchronous channels. A mixed adversary
A(tb;tf ;tp) with infinite comp...
Efficient Perfectly Reliable and Secure Communication Tolerating Mobile Adversary
Information Theoretic Security Communication Efficiency Mobile Adversary
2009/6/3
We study the problem of Perfectly Reliable Message Transmission (PRMT) and Perfectly
Secure Message Transmission (PSMT) between two nodes S and R in an undirected synchronous
network, a part of whic...
Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks
Ad-hoc network Anonymity Routing
2008/12/19
The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ...