搜索结果: 1-15 共查到“知识库 Trust”相关记录123条 . 查询时间(0.062 秒)
Computing across Trust Boundaries using Distributed Homomorphic Cryptography
distributed homomorphic cryptosystems threshold cryptography secure multiparty computation
2019/8/26
In this work, we advance the conceptual and technical aspects of Secure Multiparty Computation (SMC). We approach SMC as a computational problem and propose a novel formulation of this problem in term...
ProtectIOn: Root-of-Trust for IO in Compromised Platforms
Compromised Platforms control systems
2019/7/31
Security and safety-critical remote applications such as e-voting, online banking, industrial control systems, medical devices, and home automation systems rely upon user interaction that is typically...
IoT systems are vulnerable to various cyber attacks as they form a subset of the In- ternet. Insider attacks find more significance since many devices are configured to access the Internet without int...
Minimizing Trust in Hardware Wallets with Two Factor Signatures
digital signatures threshold cryptography
2019/1/9
We introduce the notion of two-factor signatures (2FS), a generalization of a two-out-of-two threshold signature scheme in which one of the parties is a hardware token which can store a high-entropy s...
Authentication with weaker trust assumptions for voting systems
voting systems cryptographic protocols
2018/3/5
Some voting systems are reliant on external authentication services. Others use cryptography to implement their own. We combine digital signatures and non-interactive proofs to derive a generic constr...
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems
trust management social secret sharing applied cryptography
2017/8/1
In distributed storage systems, documents are shared among multiple Cloud providers and stored within their respective storage servers. In social secret sharing-based distributed storage systems, shar...
Trust models are widely used in various computer science disciplines. The main purpose of a trust model is to continuously measure trustworthiness of a set of entities based on their behaviors. In thi...
Centralized reputation systems use stars and reviews and thus require algorithm secrecy to avoid manipulation. In autonomous open source decentralized systems this luxury is not available. We create a...
Write-Optimized Consistency Verification in Cloud Storage with Minimal Trust
Merkle tree hash functions authentication codes
2016/12/7
We propose log-structured ADSs for lightweight verification in cloud outsourcing. Our approach is leveraging recently available commercial TEE (trusted execution environment, such as Intel SGX). For s...
A VERSION-SIMILARITY BASED TRUST DEGREE COMPUTATION MODEL FOR CROWDSOURCING GEOGRAPHIC DATA
Crowdsourcing Geographic Data Trust Degree Reputation
2016/7/8
Quality evaluation and control has become the main concern of VGI. In this paper, trust is used as a proxy of VGI quality, a version-similarity based trust degree computation model for crowdsourcing g...
A Novel Methodology for Testing Hardware Security and Trust Exploiting On-Chip Power Noise Measurements (Extended Version)
security trust standardised side-channel measurement
2016/5/30
Testing of electronic components is indispensable to minimize malfunction
and failure of complex electronic systems. Currently, functionality and performance of
these electronic components are the m...
Attack Resistant Trust Metrics for Public Key Certification
Attack Resistant Trust Metrics Public Key Certification
2016/5/24
This paper investigates the role of trust metrics in attack-resistant public key certification. We present an analytical framework for understanding the effectiveness of trust metrics in resisting att...
Efficient quantum-resistant trust Infrastructure based on HIMMO
Post-Quantum Cryptography HIMMO TLS
2016/4/26
Secure Internet communications face conflicting demands: advances in (quantum) computers require stronger, quantum-resistant algorithms, while at the same time the Internet of Things demands better-pe...
Server Notaries: A Complementary Approach to the Web PKI Trust Model
Web PKI SSL/TLS man-in-the-middle attack
2016/2/23
. SSL/TLS is the de facto protocol for providing secure communication
over the Internet. It relies on the Web PKI model for authentication
and secure key exchange. Despite its relatively successful ...
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation
data aggregation privacy time-series data
2016/1/23
With the advent of networking applications collecting user data on a massive scale, the privacy of individual users appears to be a major concern. The main challenge is the design of a solution that...