搜索结果: 1-11 共查到“军事学 environment”相关记录11条 . 查询时间(0.046 秒)
Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment
blockchain Bitcoin, security
2019/5/21
One of Bitcoin’s core security guarantees is that, for an attacker to be able to successfully interfere with the Bitcoin network and reverse transactions, they need to control 51% of total hash power....
Breaking a Lightweight M2M Authentication Protocol for Communications in IIoT Environment
M2M communications IIoT Authentication
2018/11/9
The concept of the Industrial Internet of Things (IIoT) can be defined as the integration of smart sensor networks and the Internet of Things (IoT). This technology can be employed in various industri...
A Secure User Authentication and Key Agreement Scheme for HWSN Tailored for the Internet of Things Environment
Internet of Things Wireless Sensor Networks Vulnerability
2017/6/22
Internet of things (IOT) is the term used to describe a world in which the things interact with other things through internet connection or communication means, share the information together and or p...
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
user authentication key agreement cryptanalysis
2016/1/27
Recently, Farasha et al. proposed an efficient user authentication and key
agreement scheme for heterogeneous wireless sensor network tailored for the Internet
of Things environment. By using BAN-lo...
Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment
Practical Receipt-Free Sealed-Bid Auction Coercive Environment
2016/1/25
Sealed-Bid auction is an efficient and rational method to establish the price in open market. However sealed-bid auctions are sub- ject to bid-rigging attack. Receipt-free mechanisms were proposed to ...
Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment
Single Password Hostile Environment
2016/1/9
Passwords are inherently vulnerable to dictionary attacks, but are quite secure if guessing attempts can be
slowed down, for example by an online server. If this server gets compromised, however, the...
True Random Number Generators Secure in a Changing Environment: Improved Security Bounds
True Random Number Generators Resilient Extractors Hash Functions
2016/1/6
Barak, Shaltiel Tromer showed how to construct a True Random
Number Generator (TRNG) which is secure against an adversary
who has some limited control over the environment.
Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards
cryptographic protocols / Authentication smart cards dynamic ID multi-server system password attack
2012/3/28
The security of a dynamic ID-based remote user authentication scheme for multi-server environment using smart cards proposed by Lee et al. [Lee, C-C., Lin, T-H., Chang, R-X., A Secure Dynamic ID based...
Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards
cryptographic protocols / Authentication smart cards dynamic ID multi-server system password attack
2011/6/8
The security of a dynamic ID-based remote user authentication scheme for multi-server environment using smart cards proposed by Lee et al. [Lee, C-C., Lin, T-H., Chang, R-X., A Secure Dynamic ID based...
A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment
password authentication impersonation attack user privacy protection Kerberos password guessing attack smart card lost attack
2010/7/14
Since Kerberos suffers from KDC (Key Distribution Center) compromise and impersonation attack, a multi-server password authentication protocol which highlights no verification table in the server end ...
DDH-based Group Key Agreement in a Mobile Environment
group key agreement multicast security model DDH
2009/3/27
A group key agreement protocol is designed to efficiently implement secure mul-
ticast channels for a group of parties communicating over an untrusted, open network by
allowing them to agree on a co...