搜索结果: 1-2 共查到“军事学 Semi-Honest Adversaries”相关记录2条 . 查询时间(0.065 秒)
Topology-Hiding Computation Beyond Semi-Honest Adversaries
topology-hiding broadcast topology-hiding computation fail-stop
2018/3/8
Topology-hiding communication protocols allow a set of parties, connected by an incomplete network with unknown communication graph, where each party only knows its neighbors, to construct a complete ...
Secure Random Key Pre-Distribution Against Semi-Honest Adversaries
Secure Random Key Pre-Distribution Semi-Honest Adversaries
2009/6/9
Recently, Eschenauer and Gligor [EG02] proposed a model (the EG-model) for random
key pre-distribution in distributed sensor networks (DSN) that allows sensors to establish private
shared keys. In t...