搜索结果: 1-6 共查到“军事学 transport”相关记录6条 . 查询时间(0.25 秒)
Experience shows that most researchers and developers tend to treat plain-domains (those that are not prefixed with “www” sub-domains, e.g. “example.com”) as synonyms for their equivalent www-domains ...
Optimizing Transport Layer for Secure Computation
Framework Transport layer Garbled circuits Implementation
2019/7/22
Transport layer: Although significantly improved, the performance of 2PC is still prohibitive for practical systems. Contrary to the common belief that bandwidth is the remaining bottleneck for 2PC im...
Considering that access to information is one of the most important aspects of modern society, the actions of certain governments or internet providers to control or, even worse, deny access for their...
On formal and automatic security verification of WSN transport protocols
cryptographic protocols / Transport protocols for Wireless Sensor Networks
2013/2/21
In this paper, we address the problem of formal and automated security verification of WSN transport protocols that may perform cryptographic operations. The verification of this class of protocols is...
Security Proof of ”Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA”
Security Proof Leakage-Resilient Authenticated Key Transport Protocol RSA
2009/2/13
In this paper, we prove the security of the RSA-AKE protocol [9] in the random oracle
model. The proof states that the RSA-AKE protocol is secure against an adversary who gets the
client’s stored se...
Weaknesses in a leakage-resilient authenticated key transport protocol
leakage-resilient authenticated key transport protocol RSA-AKE Shin
2009/2/11
In this paper we demonstrate the existence of a number of weaknesses in
a leakage-resilient authenticated key transport (RSA-AKE) protocol due to
Shin, Kobara and Imai.