搜索结果: 1-5 共查到“军事学 efficient scheme”相关记录5条 . 查询时间(0.046 秒)
Decentralized ledger-based cryptocurrencies such as Bitcoin provide a means to construct payment systems without requiring a trusted bank, yet the anonymity of Bitcoin is proved to be far from enough....
Proxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security Analysis and an Efficient Scheme
cryptographic protocols privacy requirements
2016/12/10
In vehicular ad hoc networks, message authentication using proxy vehicles was proposed to reduce the computational overhead of roadside unites. In this type of message authentication schemes, proxy ve...
Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing
Secure Client-Side Deduplication Public auditing Privacy
2016/7/14
Existing cloud storage systems receive the data in its plain form and perform conventional (server-side) deduplication mechanisms. However, disclosing the data to the cloud can potentially threaten th...
An Efficient Scheme for Centralized Group Key Management in Collaborative Environments
Rekeying collaborative platforms
2014/3/11
The increasing demand for on-line collaborative applications has sparked the interest for multicast services, which in many cases have to guarantee properties such as authentication or confidentiality...
Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange
group key agreement authenticated key agreement provable security factoring
2009/3/26
Group key agreement protocols are designed to solve the fundamental problem of securely
establishing a session key among a group of parties communicating over a public channel.
Although a number of ...