搜索结果: 1-6 共查到“Security Protocol”相关记录6条 . 查询时间(0.062 秒)
A Key Recovery Attack on Error Correcting Code Based a Lightweight Security Protocol
Authentication error correcting coding lightweight
2016/1/9
One of the interesting types of RFID application is RFID searching which aims to hear a specific RFID tag from a large group of tags, i.e. ability of detecting whether a target RFID tag is nearby. Ver...
An Ideal-Security Protocol for Order-Preserving Encoding
order-preserving encoding encryption
2013/4/18
Order-preserving encryption - an encryption scheme where the sort order of ciphertexts matches the sort order of the corresponding plaintexts - allows databases and other applications to process queri...
Recently Qian et al. have proposed a new attack for RFID systems, called counting attack, where the attacker just aims to estimate the number of tagged objects instead of steal the tags' private infor...
Design and correctness proof of a security protocol for mobile banking
security protocol cornerstone implementation mobile banking services the security properties
2011/9/24
A strong security protocol is the cornerstone for the implementation of mobile banking services and is used to determine the security properties of the system. This paper proposes an application layer...
A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption
Network Security Military Ad-hoc network Cryptography Signcryption Multi-tiered Structures
2010/10/12
Mobile Ad-hoc NETworks (MANETs) are expected to play an important role in tactical military networks by providing infrastructureless communication. However, maintaining secure and instant information ...
A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption
Network Security Military Ad-hoc network Cryptography Signcryption Multi-tiered Structures
2010/3/17
Mobile Ad-hoc NETworks (MANETs) are expected to play an important role in tactical military networks by providing infrastructureless communication. However, maintaining secure and instant information ...