Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Message adversary“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Message adversary" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Message adversary"
TONIEN, DONGVU, REIHANEH SAFAVI-NAINI und PETER WILD. „ON "THE POWER OF VERIFICATION QUERIES" IN UNCONDITIONALLY SECURE MESSAGE AUTHENTICATION“. Discrete Mathematics, Algorithms and Applications 03, Nr. 03 (September 2011): 287–303. http://dx.doi.org/10.1142/s1793830911001218.
Der volle Inhalt der QuelleHaroutunian, Mariam, Parandzem Hakobyan und Arman Avetisyan. „Two-Stage Optimal Hypotheses Testing for a Model of Stegosystem with an Active Adversary“. JUCS - Journal of Universal Computer Science 29, Nr. 11 (28.11.2023): 1254–73. http://dx.doi.org/10.3897/jucs.112913.
Der volle Inhalt der QuelleAkhmetzyanova, Liliya R., und Alexandra A. Babueva. „On the unforgeability of the Chaum - Pedersen blind signature scheme“. Prikladnaya Diskretnaya Matematika, Nr. 65 (2024): 41–65. http://dx.doi.org/10.17223/20710410/65/3.
Der volle Inhalt der QuelleGuo, Li, und Gang Yao. „Protocols for Message Authentication from a Weak Secret“. Applied Mechanics and Materials 380-384 (August 2013): 2892–96. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2892.
Der volle Inhalt der QuelleRyabko, Boris. „Unconditionally Secure Ciphers with a Short Key for a Source with Unknown Statistics“. Entropy 25, Nr. 10 (30.09.2023): 1406. http://dx.doi.org/10.3390/e25101406.
Der volle Inhalt der QuellePatra, Arpita, Ashish Choudhary, C. Pandu Rangan, Kannan Srinathan und Prasad Raghavendra. „Perfectly reliable and secure message transmission tolerating mobile adversary“. International Journal of Applied Cryptography 1, Nr. 3 (2009): 200. http://dx.doi.org/10.1504/ijact.2009.023467.
Der volle Inhalt der QuelleHu, Zhi Wen, Xian Ming Wang, Tao Tao Lv, Shan Shan Zhao und Rui Jun Jing. „Random Linear Network Coding with Probabilistic Polynomial-Time Wiretap Adversary“. Applied Mechanics and Materials 556-562 (Mai 2014): 6354–57. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6354.
Der volle Inhalt der QuelleZhong, Sheng. „An Efficient and Secure Cryptosystem for Encrypting Long Messages“. Fundamenta Informaticae 71, Nr. 4 (Januar 2006): 493–97. https://doi.org/10.3233/fun-2006-71407.
Der volle Inhalt der QuelleBishara, Azmi. „The Quest for Strategy“. Journal of Palestine Studies 32, Nr. 2 (01.01.2003): 41–49. http://dx.doi.org/10.1525/jps.2003.32.2.41.
Der volle Inhalt der QuellePriya R., Sathiya, und V. Gokulakrishnan. „Effectively Secure Data Retrieving for Using Three Different Level Security“. International Journal of Advance Research and Innovation 3, Nr. 2 (2015): 49–53. http://dx.doi.org/10.51976/ijari.321512.
Der volle Inhalt der QuelleDissertationen zum Thema "Message adversary"
Yang, Q. „Secure message transmission in the general adversary model“. Thesis, University College London (University of London), 2011. http://discovery.ucl.ac.uk/1334691/.
Der volle Inhalt der QuelleAlbouy, Timothé. „Foundations of reliable cooperation under asynchrony, Byzantine faults, and message adversaries“. Electronic Thesis or Diss., Université de Rennes (2023-....), 2024. http://www.theses.fr/2024URENS062.
Der volle Inhalt der QuelleThis thesis explores fault-tolerant distributed systems. It focuses more specifically on implementing reliable broadcast in asynchronous environments prone to hybrid failures. We introduce a novel computing model combining Byzantine process failures with a message adversary. We then define the Message-Adversary-tolerant Byzantine Reliable Broadcast (MBRB) abstraction and prove its optimal resilience condition. We present three key algorithms implementing this abstraction: a simple signature-based MBRB algorithm, a new primitive called k2l-cast for cryptography-free MBRB implementations, and an erasure-coding-based MBRB algorithm optimizing communication complexity. These contributions advance the understanding of fault-tolerant distributed systems and provide a foundation for designing resilient and efficient distributed algorithms, with applications in critical infrastructures, financial systems, and blockchain technologies
Bücher zum Thema "Message adversary"
Perkins, James C. Midnight Religion: Messages of Victory in the Midst of Adversity. Sims Media Group, 2016.
Den vollen Inhalt der Quelle findenOssei-Owusu, Shaun. Barack Obama’s Anomalous Relationship with the Hip-Hop Community. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252036453.003.0014.
Der volle Inhalt der QuelleWellman, Trisha, Christine Merriman, Ann Aubin Gibson, Kari Aum und Christa Swart. My Mess Is My Message: Inspiring Stories of Incredible Women Who Found Purpose and Prosperity Through Adversity. Independently Published, 2022.
Den vollen Inhalt der Quelle findenYoung People, You Are under Attack!: A Message to Bring Out the Leader in Today's Youth, Despite Adversity. Independently Published, 2022.
Den vollen Inhalt der Quelle findenGibbs, Robert. Young People, You Are under Attack!: A Message to Bring Out the Leader in Today's Youth, Despite Adversity. Independently Published, 2022.
Den vollen Inhalt der Quelle findenWilson, Lindsay. Job. Wm. B. Eerdmans Publishing Co., 2015. http://dx.doi.org/10.5040/bci-008j.
Der volle Inhalt der QuelleBuchteile zum Thema "Message adversary"
Serjantov, Andrei, und Steven J. Murdoch. „Message Splitting Against the Partial Adversary“. In Privacy Enhancing Technologies, 26–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11767831_3.
Der volle Inhalt der QuelleSchmid, Ulrich, Manfred Schwarz und Kyrill Winkler. „On the Strongest Message Adversary for Consensus in Directed Dynamic Networks“. In Structural Information and Communication Complexity, 102–20. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01325-7_13.
Der volle Inhalt der QuelleChoudhury, Ashish, Kaoru Kurosawa und Arpita Patra. „Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary“. In Applied Cryptography and Network Security, 292–308. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21554-4_17.
Der volle Inhalt der QuelleSafavi-Naini, Reihaneh, und Mohammed Ashraful Alam Tuhin. „Bounds and Constructions for 1-Round (0,δ)-Secure Message Transmission against Generalized Adversary“. In Progress in Cryptology - AFRICACRYPT 2012, 82–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31410-0_6.
Der volle Inhalt der QuelleHunter, Aaron. „Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversary“. In Intelligence and Security Informatics, 61–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89900-6_9.
Der volle Inhalt der QuelleOmolewa, Michael, Emmanuel Orihentare Eregare und Rose Eyefujinrin Ebohon. „Africa’s Response to Intangible Cultural Heritage Convention“. In Heritage Studies, 113–24. Cham: Springer Nature Switzerland, 2024. https://doi.org/10.1007/978-3-031-72123-6_7.
Der volle Inhalt der QuelleHess, Daniel Baldwin, und Alex Bitterman. „Who Are the People in Your Gayborhood? Understanding Population Change and Cultural Shifts in LGBTQ+ Neighborhoods“. In The Life and Afterlife of Gay Neighborhoods, 3–39. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-66073-4_1.
Der volle Inhalt der QuelleBalasubramanian, Kannan. „Securing Public Key Encryption Against Adaptive Chosen Ciphertext Attacks“. In Algorithmic Strategies for Solving Complex Problems in Cryptography, 134–44. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2915-6.ch011.
Der volle Inhalt der QuelleLebovic, James H. „Commitment“. In The False Promise of Superiority, 93—C4P103. Oxford University PressNew York, 2023. http://dx.doi.org/10.1093/oso/9780197680865.003.0004.
Der volle Inhalt der QuelleWatkins, Calvert. „Preliminaries“. In How to Kill a Dragon, 297–303. Oxford University PressNew York, NY, 1995. http://dx.doi.org/10.1093/oso/9780195085952.003.0027.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Message adversary"
Srinathan, Kannan, Arpita Patra, Ashish Choudhary und C. Pandu Rangan. „Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary“. In the 4th International Symposium. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1533057.1533083.
Der volle Inhalt der QuelleBlacksttone, Jeremy, und Wayne Patterson. „Isolating Key Phrases to Identify Ransomware Attackers“. In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002200.
Der volle Inhalt der QuellePatafta, Dominik, und Ines Milohnić. „CHALLENGES OF MANAGERIAL COMMUNICATION IN HOTEL BUSINESS OPERATIONS“. In Tourism and hospitality industry. University of Rijeka, Faculty of Tourism and Hospitality Management, 2023. http://dx.doi.org/10.20867/thi.26.21.
Der volle Inhalt der QuelleGurbuz, Mustafa. „PERFORMING MORAL OPPOSITION: MUSINGS ON THE STRATEGY AND IDENTITY IN THE GÜLEN MOVEMENT“. In Muslim World in Transition: Contributions of the Gülen Movement. Leeds Metropolitan University Press, 2007. http://dx.doi.org/10.55207/hzit2119.
Der volle Inhalt der Quelle