搜索结果: 1-5 共查到“军事学 identification protocol”相关记录5条 . 查询时间(0.059 秒)
Cryptanalysis of the Convex Hull Click Human Identification Protocol
Human Identification Protocols Observer Attack Entity Authentication
2010/9/14
Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the...
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
Human Computer Cryptography Human Identification Protocols Entity Authenticaion
2010/7/13
We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on human identification protocol...
An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption
Efficient Identification Protocol Knowledge-of-Exponent Assumption
2009/6/2
In this paper, we propose an extremely simple identification protocol and prove its security
using the Knowledge-of-Exponent Assumption (KEA). We also discuss the applicability of KEA
in various pro...
An Efficient and Secure Two-flow Zero-Knowledge Identification Protocol
Two-flow Zero-Knowledge Identification Protocol
2008/12/22
An Efficient and Secure Two-flow Zero-Knowledge Identification Protocol.
An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption
Efficient Identification Protocol Knowledge-of-Exponent Assumption
2008/5/20
In this paper, we propose an extremely simple identification protocol and prove its security
using the Knowledge-of-Exponent Assumption (KEA). We also discuss the applicability of KEA
in various pro...