搜索结果: 1-12 共查到“知识库 secure communication”相关记录12条 . 查询时间(0.062 秒)
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC
applied cryptography provable security TLS
2019/4/29
Secure channel establishment protocols such as TLS are some of the most important cryptographic protocols, enabling the encryption of Internet traffic. Reducing the latency (the number of interactions...
Security features are of paramount importance for IoT, and implementations are challenging given the resource-constrained IoT set-up. We have developed a lightweight identity-based cryptosystem suitab...
T-Proof: Secure Communication via Non-Algorithmic Randomization
identity theft non-repeat identification dialogue
2016/5/20
shared random strings are either communicated or recreated algorithmically in “pseudo” mode, thereby exhibiting innate vulnerability. Proposing a secure protocol based on unshared randomized data, whi...
Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines
reverse firewalls exfiltration secure message transmission
2015/12/30
A secure reverse firewall, as recently defined by Mironov and Stephens-Davidowitz, is a
third party that “sits between a user and the outside world” and modifies the user’s sent and received
message...
Enabling End-to-End Secure Communication with Anonymous and Mobile Receivers - an Attribute-Based Messaging Approach
attribute-based encryption attribute-based messaging
2014/3/11
Mechanisms for secure mobile communication can be enablers for novel applications in the area of cooperative work. In this context, this article exemplarily investigates an emergency management settin...
Secure Communication over Parallel Relay Channel
Secure Communication Parallel Relay Channel
2010/11/15
We investigate the problem of secure communication over the parallel relay channel in the presence of a passive eavesdropper. We consider a four terminal relay-eavesdropper channel which consists of m...
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary
Perfect Reliability Information Theoretic Security Static and Mobile Mixed Adversary
2009/6/5
In the problem of perfectly reliable message transmission (PRMT), a sender S and a
receiver R are connected by n bidirectional synchronous channels. A mixed adversary
A(tb;tf ;tp) with infinite comp...
Efficient Perfectly Reliable and Secure Communication Tolerating Mobile Adversary
Information Theoretic Security Communication Efficiency Mobile Adversary
2009/6/3
We study the problem of Perfectly Reliable Message Transmission (PRMT) and Perfectly
Secure Message Transmission (PSMT) between two nodes S and R in an undirected synchronous
network, a part of whic...
Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks
Ad-hoc network Anonymity Routing
2008/12/19
The main characteristic of a mobile ad-hoc network is its infrastructure-less, highly dynamic topology, which is subject to malicious traffic analysis. Malicious intermediate nodes in wireless mobile ...
Bi-directional Secure Communication Based on Discrete Chaotic Synchronization
bi-directional secure communication discrete chaotic synchronization
2007/8/15
2007Vol.47No.6pp.1076-1080DOI:
Bi-directional Secure Communication Based on Discrete Chaotic Synchronization
LONG Min,1 QIU Shui-Sheng,2 and PENG Fei3
1 College of Compu...
A Non-symmetric Digital Image Secure Communication Scheme
Based on Generalized Chaos Synchronization System
generalized chaos synchronization Sinai map image confusion non-symmetric key
data origin authentication network communication
2007/8/15
2005Vol.44No.6pp.1115-1124DOI:
A Non-symmetric Digital Image Secure Communication Scheme
Based on Generalized Chaos Synchronization System
ZHANG Xiao-Hong1,2 and MIN Le-Quan1
...
Approach to Generalized Synchronization with Application to
Chaos-Based Secure Communication
synchronization neural network cellular chaos numerical using
chaos numerical simulation
2007/8/15
2004Vol.41No.4pp.632-640DOI:
Approach to Generalized Synchronization with Application to
Chaos-Based Secure Communication
MIN Le-Quan,1 CHEN Guan-Rong,2 ZHANG
Xiao-Dan,1 ZHANG
...