军事学 >>> 军事学
搜索结果: 1-11 共查到军事学 certificates相关记录11条 . 查询时间(0.623 秒)
We introduce the notion of non-uniformly sound certificates: succinct single-message (unidirectional) argument systems that satisfy a ``best-possible security'' against non-uniform polynomial-time att...
Vehicular communication (V2X) technologies are expected to be common in the future, providing better transportation safety and efficiency. However, their large-scale deployment requires addressing som...
Vehicular communication (V2X) technologies allow vehicles to exchange information about the road conditions and their own status, and thereby enhance transportation safety and efficiency. For broader ...
Vehicular communication (V2X) technologies are expected to become increasingly common in the future. Although they enable improvements on transportation safety and efficiency, the large scale deployme...
If quantum computers were built, they would pose concerns for public key cryptography as we know it. Among other cryptographic techniques, they would jeopardize the use of PKI X.509 certificates (RSA,...
A public key infrastructure (PKI) binds public keys to the identities of their respective owners. It employs certificate authorities or a web of trust over social links to transitively build cryptogra...
We specify Issue First Activate Later (IFAL). This is an ETSI type of V2X Public Key Infrastructure based on short-lived pseudonymous certificates without Certificate Revocation Lists. IFAL certificat...
We newly propose a multiple and unlinkable identity-based public key encryption scheme. Unlike the traditional public key encryp- tion and identity-based encryption schemes, our scheme allows the us...
An accumulator scheme, introduced be Benaloh and de Mare [BdM94] and further studied by Baric and Ptzmann [BP97], is an algorithm that allows to hash a large set of inputs into one short value, cal...
We announce a method for the construction of pairs of valid X.509 certificates in which the “to be signed” parts form a collision for the MD5 hash function. As a result the issuer signatures in the ce...
We have shown how, at a cost of about 252 calls to the MD5 compression function, for any two target messages m1 and m2, values b1 and b2 can be constructed such that the concatenated values m1kb1 an...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...