搜索结果: 1-6 共查到“军队指挥学 Connectivity”相关记录6条 . 查询时间(0.015 秒)
With the BCT, previous observations on the S-box including the incompatibility, the ladder switch and the S-box switch are represented in a unified manner. Moreover, the BCT can detect a new switching...
Server-Aided Two-Party Computation with Minimal Connectivity in the Simultaneous Corruption Model
two-party computation simultaneous corruption universal composability with local adversaries
2016/1/6
We consider secure two-party computation in the client-server model. In our scenario, two adversaries
operate separately but simultaneously, each of them corrupting one of the parties and a
restrict...
Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks
Directed networks Connectivity Information-theoretic security
2012/3/27
In this paper we give the minimal connectivity required in a synchronous directed network, which is under the influence of a computationally unbounded \emph{Byzantine} adversary that can corrupt a sub...
Interplay between (im)perfectness, synchrony and connectivity: The Case of Probabilistic Reliable Communication
fault-tolerant distributed computing reliable communication information theoretic security randomized algorithms (im)possibility proofs
2010/7/14
For unconditionally reliable message transmission (URMT) in synchronous directed
networks of n nodes, a subset of which may be Byzantine faulty, it is well-known that the minimum connectivity require...
Secure Connectivity Model In Wireless Sensor Network(WSN) Using 1st Order Reed Muller Codes
cryptographic protocols Connectivity Communication Reed-Muller Codes Reed-Solomon Codes Security
2010/7/14
In this paper, we suggest the idea of separately treating the connectivity and communication model of a Wireless Sensor Network(WSN). We then propose a novel connectivity model for a WSN using first o...
Multiparty Computation Based on Connectivity of Graphs
Liangliang Xiao Mulan Liu Zhifang Zhang
2009/2/7
In this paper, we contribute the construction of practical perfect multiparty computation
protocols based on the connectivity of graphs.