搜索结果: 1-4 共查到“军队指挥学 impersonation”相关记录4条 . 查询时间(0.312 秒)
An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities
Authentication codes optimality against impersonation substitution attacks
2015/12/29
A new systematic authentication scheme based on the Gray map
over Galois rings is introduced. The Gray map determines an isometry between
the Galois ring and a vector space over a Galois field. The ...
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
Group Key Exchange Key Compromise Impersonation Insider Attacks
2009/6/23
A key exchange protocol allows a set of parties to agree upon a secret session key over a
public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various
models c...
Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key
Enhancing CK-Model Key Compromise Impersonation Resilience Identity-based Key
2009/3/19
In 2001, Canetti and Krawczyk proposed a security model (CKmodel)
for authentication protocols. They also gave an indistinguishabilitybased
definition for key exchange protocols. Since then the mode...
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
key compromise impersonation key agreement protocols
2008/12/9
Key agreement protocols are a fundamental building block for ensuring
authenticated and private communications between two parties over an insecure
network. This paper focuses on key agreement prot...