搜索结果: 1-15 共查到“军队指挥学 integrity”相关记录30条 . 查询时间(0.094 秒)
Forward Integrity and Crash Recovery for Secure Logs
cryptographic protocols computer systems
2019/5/21
Logging is a key mechanism in the security of computer systems. Beyond supporting important forward security properties, it is critical that logging withstands both failures and intentional tampering ...
(R)CCA Secure Updatable Encryption with Integrity Protection
updatable encryption integrity, key rotation ciphertext-independence
2019/2/28
An updatable encryption scheme allows a data host to update ciphertexts of a client from an old to a new key, given so-called update tokens from the client. Rotation of the encryption key is a common ...
libInterMAC: Beyond Confidentiality and Integrity in Practice
fragmentation attack SSH Authenticated Encryption
2019/2/25
Boldyreva et al. (Eurocrypt 2012) defined a fine-grained security model capturing ciphertext fragmentation attacks against symmetric encryption schemes. The model was extended by Albrecht et al. (CCS ...
End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability
secure messaging mobile messaging
2018/11/16
In this paper, we describe Mobile CoWPI, a deployable, end-to-end secure mobile group messaging application with proofs of security. Mobile CoWPI allows dynamic groups of users to participate in, join...
Breaking Message Integrity of an End-to-End Encryption Scheme of LINE
E2EE LINE key exchange
2018/7/16
In this paper, we analyze the security of an end-to-end encryption scheme (E2EE) of LINE, a.k.a Letter Sealing. LINE is one of the most widely-deployed instant messaging applications, especially in Ea...
Cryptographic Constructions Supporting Implicit Data Integrity
Data Integrity Implicit Integrity Observer Functions
2018/6/5
We study a new methodology supporting data integrity called 'implicit integrity' and present cryptographic constructions supporting it. Implicit integrity allows for corruption detection without produ...
VeritasDB: High Throughput Key-Value Store with Integrity
key-value store guarantees data integrity
2018/3/8
While businesses shift their databases to the cloud, they continue to depend on them to operate correctly. Alarmingly, cloud services constantly face threats from exploits in the privileged computing ...
Scalable, transparent, and post-quantum secure computational integrity
zero knowledge computational integrity blockchains
2018/1/11
Human dignity demands that personal information, like medical and forensic data, be hidden from the public. But veils of secrecy designed to preserve privacy may also be abused to cover up lies and de...
IntegriKey: End-to-End Integrity Protection of User Input
End-to-End Integrity Protection User Input
2018/1/2
Networked critical systems, such as Programmable Logic Controllers in a factory plant, are often remotely configurable by administrators through web-based interfaces. However, administrative host mach...
The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much like its antecedents COPA, ELmE, and ELmD, COLM consists of two parallelizable encryption layers con...
A QKD-based digital archiving solution providing everlasting confidentiality and integrity
QKD secret sharing commitments
2016/12/12
With increasing digitization, the amount of archived data that requires long-term protection of confidentiality and integrity increases rapidly. Examples include electronic health records, genome data...
Computational integrity with a public random string from quasi-linear PCPs
PCP implementation interactive proofs
2016/6/27
A party running a computation remotely may benefit from misreporting its output, say, to lower its tax. Cryptographic protocols that detect and prevent such falsities hold the promise to enhance the s...
Game-Theoretic Framework for Integrity Verication in Computation Outsourcing
computation outsourcing integrity game theory
2016/6/22
In the cloud computing era, in order to avoid computational burdens, many organizations tend to outsource their computations to third-party cloud servers. In order to protect service quality, the inte...
Ghostshell: Secure Biometric Authentication using Integrity-based Homomorphic Evaluations
Biometric authentication Homomorphic encryption MAC
2016/5/24
Biometric authentication methods are gaining popularity due to their convenience. For an authentication without relying on trusted hardwares, biometrics or their hashed values should be stored in the ...
Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations
Collaborative filtering Outsourcing Integrity
2016/2/24
In the cloud computing era, in order to avoid the computational burdens, many recommendation service providers tend to outsource their collaborative filtering computations to third-party cloud servers...