搜索结果: 1-4 共查到“军事学 New Approaches”相关记录4条 . 查询时间(0.3 秒)
New Approaches to Traitor Tracing with Embedded Identities
traitor tracing public-key cryptography
2019/8/30
In a traitor tracing (TT) system for nn users, every user has his/her own secret key. Content providers can encrypt messages using a public key, and each user can decrypt the ciphertext using his/her ...
New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations
secure outsourcing algorithm modular exponentiations one-malicious model
2016/1/27
Outsourcing paradigm is one of the most attractive benefits of cloud computing,
where computation workloads can be outsourced to cloud servers by the resourceconstrained
devices, such as RFID tags. ...
New Approaches to Password Authenticated Key Exchange based on RSA
password authentication off-line dictionary attack
2009/3/23
We investigate eÆcient protocols for password-authenticated key exchange based on the RSA
public-key cryptosystem. To date, most of the published protocols for password-authenticated
key excha...
Deniable Authentication protocols allow a Sender to authenticate a message for a Receiver,
in a way that the Receiver cannot convince a third party that such authentication (or any
authentication) e...