搜索结果: 1-15 共查到“知识库 Internet”相关记录500条 . 查询时间(0.12 秒)
Cryptanalysis of an Ultra lightweight Authentication Scheme based on Permutation Matrix Encryption for Internet of Vehicles
IoV security analysis matrix encryption
2019/7/23
Internet of Things (IoT) has various applications such as healthcare, supply chain, agriculture, etc. Using the Internet of Vehicles(IoV) to control traffic of the cities is one of the IoT application...
Towards Forward Secure Internet Traffic
cryptographic protocols applied cryptography key exchange
2019/7/17
Forward Secrecy (FS) is a security property in key-exchange algorithms which guarantees that a compromise in the secrecy of a long-term private-key does not compromise the secrecy of past session keys...
The basic concept behind the emergence of Internet of Things (IoT) is to connect as many objects to the Internet as possible in an attempt to make our lives better in some way. However, connecting eve...
Fast Secure Computation for Small Population over the Internet
Secure Multiparty Computation Fairness Guaranteed Output Delivery
2018/8/2
Secure Multi-Party Computation (MPC) with small number of parties is an interesting area of research, primarily due to its ability to model most real-life MPC applications and the simplicity and effic...
CHARIOT: Cloud-Assisted Access Control for the Internet of Things
access control cloud computing Internet of Things
2018/6/27
The Internet of Things (IoT) technology has expanded widely across the world, promising new data management opportunities for industries, companies and individuals in different sectors, such as health...
A Secure User Authentication and Key Agreement Scheme for HWSN Tailored for the Internet of Things Environment
Internet of Things Wireless Sensor Networks Vulnerability
2017/6/22
Internet of things (IOT) is the term used to describe a world in which the things interact with other things through internet connection or communication means, share the information together and or p...
Voting systems have been around for hundreds of years and despite different views on their integrity, have always been deemed secure with some fundamental security and anonymity principles. Numerous e...
Privacy-Preserving Interdomain Routing at Internet Scale
BGP secure multi-party computation
2017/5/11
The Border Gateway Protocol (BGP) computes routes between the organizational networks that make up today's Internet. Unfortunately, BGP suffers from deficiencies, including slow convergence, security ...
Homomorphic Tallying for the Estonian Internet Voting System
cryptographic protocols Estonian Internet Voting System
2016/12/10
In this paper we study the feasibility of using homomorphic tallying in the
Estonian Internet voting system. The paper analyzes the security benefits provided
by homomorphic tallying, the costs intr...
Passive Secret Disclosure Attack on an Ultralightweight Authentication Protocol for Internet of Things
RFID Secret Disclosure Authentication
2016/12/10
Recently, Tewari and Gupta have proposed an ultralightweight RFID authentication protocol. In this paper, we consider the security of the proposed protocol and present a passive secret disclosure atta...
Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project
post-quantum cryptography key exchange implementation
2016/12/8
Designing public key cryptosystems that resist attacks by quantum computers is an important area of current cryptographic research and standardization. To retain confidentiality of today's communicati...
Apollo - End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation
cryptographic protocols evoting
2016/12/7
We present security vulnerabilities in the remote voting system Helios. We propose Apollo, a modified version of Helios, which addresses these vulnerabilities and could improve the feasibility of inte...
Optimizing Semi-Honest Secure Multiparty Computation for the Internet
secure multiparty computation semi-honest adversaries constant-round protocols
2016/12/7
In the setting of secure multiparty computation, a set of parties with private inputs wish to compute some function of their inputs without revealing anything but their output. Over the last decade, t...
STUDY OF WATER POLLUTION EARLY WARNING FRAMEWORK BASED ON INTERNET OF THINGS
Water Pollution Early Warning Automatic Monitoring Warning Framework Internet of Things
2016/11/30
In recent years, with the increasing world environmental pollution happening, sudden water pollution incident has become more and more frequently in China. It has posed a serious threat to water safet...
DESIGN AND IMPLEMENT AN INTEROPERABLE INTERNET OF THINGS APPLICATION BASED ON AN EXTENDED OGC SENSORTHINGS API STANDARD
Internet of Things Interoperable OGC SensorThings API
2016/11/8
The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring and physical mashup ap...