搜索结果: 1-5 共查到“军事学 Modelling”相关记录5条 . 查询时间(0.156 秒)
A New Approach to Modelling Centralised Reputation Systems
group signatures direct anonymous attestation reputation systems
2019/5/9
A reputation system assigns a user or item a reputation value which can be used to evaluate trustworthiness. Bl{\"o}mer, Juhnke and Kolb in 2015, and Kaafarani, Katsumata and Solomon in 2018, gave for...
The security models for Authenticated Key Exchange do not consider leakages on pre–computed ephemeral data before their use in sessions. We investigate the consequences of such leakages and point out ...
Modelling After-the-fact Leakage for Key Exchange
key exchange protocols public-key side-channel attacks
2016/1/25
Security models for two-party authenticated key exchange (AKE) protocols have developed over time
to prove the security of AKE protocols even when the adversary learns certain secret values. In this ...
Modelling ciphersuite and version negotiation in the TLS protocol
Transport Layer Security (TLS) ciphersuite negotiation version negotiation
2015/12/29
Real-world cryptographic protocols such as the widely used Transport Layer Security
(TLS) protocol support many different combinations of cryptographic algorithms (called
ciphersuites) and simultane...
Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos
BR model timestamp
2014/3/7
The notion of time plays an important role in many practically deployed cryptographic protocols, ranging from One-Time-Password (OTP) tokens to the Kerberos protocol. However, time is difficult to mod...