搜索结果: 1-3 共查到“军队指挥学 Security Protocol”相关记录3条 . 查询时间(0.078 秒)
A Key Recovery Attack on Error Correcting Code Based a Lightweight Security Protocol
Authentication error correcting coding lightweight
2016/1/9
One of the interesting types of RFID application is RFID searching which aims to hear a specific RFID tag from a large group of tags, i.e. ability of detecting whether a target RFID tag is nearby. Ver...
An Ideal-Security Protocol for Order-Preserving Encoding
order-preserving encoding encryption
2013/4/18
Order-preserving encryption - an encryption scheme where the sort order of ciphertexts matches the sort order of the corresponding plaintexts - allows databases and other applications to process queri...
Recently Qian et al. have proposed a new attack for RFID systems, called counting attack, where the attacker just aims to estimate the number of tagged objects instead of steal the tags' private infor...