Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Adversaire de message“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Adversaire de message" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Adversaire de message"
Saindon, Marcelle. „Le Buddha comme neuvième avatāra du dieu hindou Visnu“. Studies in Religion/Sciences Religieuses 32, Nr. 3 (September 2003): 299–310. http://dx.doi.org/10.1177/000842980303200304.
Der volle Inhalt der QuelleFrémeaux, Jacques. „Abd el-Kader, chef de guerre (1832-1847)“. Revue Historique des Armées 250, Nr. 1 (01.01.2008): 100–107. http://dx.doi.org/10.3917/rha.250.0100.
Der volle Inhalt der QuelleShi, Wenbo, Debiao He und Peng Gong. „On the Security of a Certificateless Proxy Signature Scheme with Message Recovery“. Mathematical Problems in Engineering 2013 (2013): 1–4. http://dx.doi.org/10.1155/2013/761694.
Der volle Inhalt der QuelleTONIEN, DONGVU, REIHANEH SAFAVI-NAINI und PETER WILD. „ON "THE POWER OF VERIFICATION QUERIES" IN UNCONDITIONALLY SECURE MESSAGE AUTHENTICATION“. Discrete Mathematics, Algorithms and Applications 03, Nr. 03 (September 2011): 287–303. http://dx.doi.org/10.1142/s1793830911001218.
Der volle Inhalt der QuelleNoh, Geontae, Ji Young Chun und Ik Rae Jeong. „Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model“. Journal of Applied Mathematics 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/371924.
Der volle Inhalt der QuelleMartin, Jeremy, Douglas Alpuche, Kristina Bodeman, Lamont Brown, Ellis Fenske, Lucas Foppe, Travis Mayberry, Erik Rye, Brandon Sipes und Sam Teplov. „Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol“. Proceedings on Privacy Enhancing Technologies 2019, Nr. 4 (01.10.2019): 34–53. http://dx.doi.org/10.2478/popets-2019-0057.
Der volle Inhalt der QuelleGodard, Emmanuel, und Eloi Perdereau. „Back to the Coordinated Attack Problem“. Mathematical Structures in Computer Science 30, Nr. 10 (November 2020): 1089–113. http://dx.doi.org/10.1017/s0960129521000037.
Der volle Inhalt der QuelleHosseini Beghaeiraveri, Seyed Amir, Mohammad Izadi und Mohsen Rezvani. „Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing“. Security and Communication Networks 2020 (01.08.2020): 1–10. http://dx.doi.org/10.1155/2020/9428457.
Der volle Inhalt der QuelleCheng, Zishuai, Mihai Ordean, Flavio Garcia, Baojiang Cui und Dominik Rys. „Watching your call: Breaking VoLTE Privacy in LTE/5G Networks“. Proceedings on Privacy Enhancing Technologies 2023, Nr. 2 (April 2023): 282–97. http://dx.doi.org/10.56553/popets-2023-0053.
Der volle Inhalt der QuelleZhong, Sheng. „An Efficient and Secure Cryptosystem for Encrypting Long Messages“. Fundamenta Informaticae 71, Nr. 4 (Januar 2006): 493–97. https://doi.org/10.3233/fun-2006-71407.
Der volle Inhalt der QuelleDissertationen zum Thema "Adversaire de message"
Albouy, Timothé. „Foundations of reliable cooperation under asynchrony, Byzantine faults, and message adversaries“. Electronic Thesis or Diss., Université de Rennes (2023-....), 2024. http://www.theses.fr/2024URENS062.
Der volle Inhalt der QuelleThis thesis explores fault-tolerant distributed systems. It focuses more specifically on implementing reliable broadcast in asynchronous environments prone to hybrid failures. We introduce a novel computing model combining Byzantine process failures with a message adversary. We then define the Message-Adversary-tolerant Byzantine Reliable Broadcast (MBRB) abstraction and prove its optimal resilience condition. We present three key algorithms implementing this abstraction: a simple signature-based MBRB algorithm, a new primitive called k2l-cast for cryptography-free MBRB implementations, and an erasure-coding-based MBRB algorithm optimizing communication complexity. These contributions advance the understanding of fault-tolerant distributed systems and provide a foundation for designing resilient and efficient distributed algorithms, with applications in critical infrastructures, financial systems, and blockchain technologies
Perdereau, Eloi. „Accords exacts et approchés pour les adversaires de message“. Electronic Thesis or Diss., Aix-Marseille, 2021. http://www.theses.fr/2021AIXM0611.
Der volle Inhalt der QuelleOur subject is about computability of distributed systems in the messageadversaries family of models.For this purpose, several mathematical approaches are carried out.For instance, based on recent advances in the subject, we use well knowntopological methods to solve our problems.But we also used geometric, combinatorial and dynamical systems methods.In the first part, we are interested in the Consensus problem and the k-SetAgreement.They are what we called exact agreements, i.e. the decision values must beamong the proposed ones.As a complement to FG11, we have characterized topologically the solvability ofthe Binary Consensus problem with two process in the general model of messageadversaries.This new characterization gives a better intuition of the result.We also characterized the solvability of k-Set Agreement in omissionadversaries by giving the number of omission faults a system can tolerate inorder to solve the problem on an underlying communication graph.Doing so, we based our result on a topological method that we extended to ourgraphical models.Finally, we studied in a second part some approximate variations of the k-SetAgreement problem.In this approximate setting, the decision values are required to be close toone another, based on some precise conditions.Several variations were studied, most notably an asymptotic version thatdoesn't requires processes to explicitly terminatebut rather requires a certain type of convergence of the values.Theses results shows the diversity and intricacy of the questions that are atstake
Yang, Q. „Secure message transmission in the general adversary model“. Thesis, University College London (University of London), 2011. http://discovery.ucl.ac.uk/1334691/.
Der volle Inhalt der QuelleBücher zum Thema "Adversaire de message"
Thomas, Damion. Goodwill Ambassadors. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252038877.003.0007.
Der volle Inhalt der QuelleForest, James J. F. Influence Warfare. Greenwood Publishing Group, Inc., 2009. http://dx.doi.org/10.5040/9798400670046.
Der volle Inhalt der QuelleBuchteile zum Thema "Adversaire de message"
Raynal, Michel. „Message Adversaries“. In Encyclopedia of Algorithms, 1272–76. New York, NY: Springer New York, 2016. http://dx.doi.org/10.1007/978-1-4939-2864-4_609.
Der volle Inhalt der QuelleRaynal, Michel. „Message Adversaries“. In Encyclopedia of Algorithms, 1–6. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-642-27848-8_609-1.
Der volle Inhalt der QuelleSerjantov, Andrei, und Steven J. Murdoch. „Message Splitting Against the Partial Adversary“. In Privacy Enhancing Technologies, 26–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11767831_3.
Der volle Inhalt der QuelleFujita, Maiki, Kenji Yasunaga und Takeshi Koshiba. „Perfectly Secure Message Transmission Against Rational Timid Adversaries“. In Lecture Notes in Computer Science, 127–44. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01554-1_8.
Der volle Inhalt der QuelleYasunaga, Kenji, und Takeshi Koshiba. „Perfectly Secure Message Transmission Against Independent Rational Adversaries“. In Lecture Notes in Computer Science, 563–82. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32430-8_33.
Der volle Inhalt der QuelleWinkler, Kyrill, Ulrich Schmid und Thomas Nowak. „Valency-Based Consensus Under Message Adversaries Without Limit-Closure“. In Fundamentals of Computation Theory, 457–74. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-86593-1_32.
Der volle Inhalt der QuelleMaffei, Ivo, und Andrew W. Roscoe. „Optimally-Fair Exchange of Secrets via Delay Encryption and Commutative Blinding“. In Financial Cryptography and Data Security, 94–111. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-47754-6_6.
Der volle Inhalt der QuelleSchmid, Ulrich, Manfred Schwarz und Kyrill Winkler. „On the Strongest Message Adversary for Consensus in Directed Dynamic Networks“. In Structural Information and Communication Complexity, 102–20. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01325-7_13.
Der volle Inhalt der QuelleChoudhury, Ashish, Kaoru Kurosawa und Arpita Patra. „Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary“. In Applied Cryptography and Network Security, 292–308. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21554-4_17.
Der volle Inhalt der QuelleSafavi-Naini, Reihaneh, und Mohammed Ashraful Alam Tuhin. „Bounds and Constructions for 1-Round (0,δ)-Secure Message Transmission against Generalized Adversary“. In Progress in Cryptology - AFRICACRYPT 2012, 82–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31410-0_6.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Adversaire de message"
Schwarz, Manfred, Kyrill Winkler und Ulrich Schmid. „Fast consensus under eventually stabilizing message adversaries“. In ICDCN '16: 17th International Conference on Distributed Computing and Networking. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2833312.2833323.
Der volle Inhalt der QuelleBlacksttone, Jeremy, und Wayne Patterson. „Isolating Key Phrases to Identify Ransomware Attackers“. In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002200.
Der volle Inhalt der QuelleNowak, Thomas, Ulrich Schmid und Kyrill Winkler. „Topological Characterization of Consensus under General Message Adversaries“. In PODC '19: ACM Symposium on Principles of Distributed Computing. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3293611.3331624.
Der volle Inhalt der QuelleRaynal, Michel, und Julien Stainer. „Synchrony weakened by message adversaries vs asynchrony restricted by failure detectors“. In the 2013 ACM symposium. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2484239.2484249.
Der volle Inhalt der QuelleSrinathan, Kannan, Arpita Patra, Ashish Choudhary und C. Pandu Rangan. „Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary“. In the 4th International Symposium. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1533057.1533083.
Der volle Inhalt der QuelleDobó, Robert. „Military Conflicts and Country Image: The Country Image of Belligerents in Light of Ukraine, a Demographic, Communication Channel and Political Preference Based Perspective“. In 29th International Scientific Conference Strategic Management and Decision Support Systems in Strategic Management. University of Novi Sad, Faculty of Economics in Subotica, 2024. http://dx.doi.org/10.46541/978-86-7233-428-9_404.
Der volle Inhalt der QuelleHanley, Daniel, Jeff King und André dos Santos. „Defeating Malicious Terminals in an Electronic Voting System“. In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2005. http://dx.doi.org/10.5753/sbseg.2005.21527.
Der volle Inhalt der QuelleGurbuz, Mustafa. „PERFORMING MORAL OPPOSITION: MUSINGS ON THE STRATEGY AND IDENTITY IN THE GÜLEN MOVEMENT“. In Muslim World in Transition: Contributions of the Gülen Movement. Leeds Metropolitan University Press, 2007. http://dx.doi.org/10.55207/hzit2119.
Der volle Inhalt der Quelle