Academic literature on the topic 'Adversaire de message'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Adversaire de message.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Adversaire de message"
Saindon, Marcelle. "Le Buddha comme neuvième avatāra du dieu hindou Visnu." Studies in Religion/Sciences Religieuses 32, no. 3 (September 2003): 299–310. http://dx.doi.org/10.1177/000842980303200304.
Full textFrémeaux, Jacques. "Abd el-Kader, chef de guerre (1832-1847)." Revue Historique des Armées 250, no. 1 (January 1, 2008): 100–107. http://dx.doi.org/10.3917/rha.250.0100.
Full textShi, Wenbo, Debiao He, and Peng Gong. "On the Security of a Certificateless Proxy Signature Scheme with Message Recovery." Mathematical Problems in Engineering 2013 (2013): 1–4. http://dx.doi.org/10.1155/2013/761694.
Full textTONIEN, DONGVU, REIHANEH SAFAVI-NAINI, and PETER WILD. "ON "THE POWER OF VERIFICATION QUERIES" IN UNCONDITIONALLY SECURE MESSAGE AUTHENTICATION." Discrete Mathematics, Algorithms and Applications 03, no. 03 (September 2011): 287–303. http://dx.doi.org/10.1142/s1793830911001218.
Full textNoh, Geontae, Ji Young Chun, and Ik Rae Jeong. "Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model." Journal of Applied Mathematics 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/371924.
Full textMartin, Jeremy, Douglas Alpuche, Kristina Bodeman, Lamont Brown, Ellis Fenske, Lucas Foppe, Travis Mayberry, Erik Rye, Brandon Sipes, and Sam Teplov. "Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol." Proceedings on Privacy Enhancing Technologies 2019, no. 4 (October 1, 2019): 34–53. http://dx.doi.org/10.2478/popets-2019-0057.
Full textGodard, Emmanuel, and Eloi Perdereau. "Back to the Coordinated Attack Problem." Mathematical Structures in Computer Science 30, no. 10 (November 2020): 1089–113. http://dx.doi.org/10.1017/s0960129521000037.
Full textHosseini Beghaeiraveri, Seyed Amir, Mohammad Izadi, and Mohsen Rezvani. "Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing." Security and Communication Networks 2020 (August 1, 2020): 1–10. http://dx.doi.org/10.1155/2020/9428457.
Full textCheng, Zishuai, Mihai Ordean, Flavio Garcia, Baojiang Cui, and Dominik Rys. "Watching your call: Breaking VoLTE Privacy in LTE/5G Networks." Proceedings on Privacy Enhancing Technologies 2023, no. 2 (April 2023): 282–97. http://dx.doi.org/10.56553/popets-2023-0053.
Full textZhong, Sheng. "An Efficient and Secure Cryptosystem for Encrypting Long Messages." Fundamenta Informaticae 71, no. 4 (January 2006): 493–97. https://doi.org/10.3233/fun-2006-71407.
Full textDissertations / Theses on the topic "Adversaire de message"
Albouy, Timothé. "Foundations of reliable cooperation under asynchrony, Byzantine faults, and message adversaries." Electronic Thesis or Diss., Université de Rennes (2023-....), 2024. http://www.theses.fr/2024URENS062.
Full textThis thesis explores fault-tolerant distributed systems. It focuses more specifically on implementing reliable broadcast in asynchronous environments prone to hybrid failures. We introduce a novel computing model combining Byzantine process failures with a message adversary. We then define the Message-Adversary-tolerant Byzantine Reliable Broadcast (MBRB) abstraction and prove its optimal resilience condition. We present three key algorithms implementing this abstraction: a simple signature-based MBRB algorithm, a new primitive called k2l-cast for cryptography-free MBRB implementations, and an erasure-coding-based MBRB algorithm optimizing communication complexity. These contributions advance the understanding of fault-tolerant distributed systems and provide a foundation for designing resilient and efficient distributed algorithms, with applications in critical infrastructures, financial systems, and blockchain technologies
Perdereau, Eloi. "Accords exacts et approchés pour les adversaires de message." Electronic Thesis or Diss., Aix-Marseille, 2021. http://www.theses.fr/2021AIXM0611.
Full textOur subject is about computability of distributed systems in the messageadversaries family of models.For this purpose, several mathematical approaches are carried out.For instance, based on recent advances in the subject, we use well knowntopological methods to solve our problems.But we also used geometric, combinatorial and dynamical systems methods.In the first part, we are interested in the Consensus problem and the k-SetAgreement.They are what we called exact agreements, i.e. the decision values must beamong the proposed ones.As a complement to FG11, we have characterized topologically the solvability ofthe Binary Consensus problem with two process in the general model of messageadversaries.This new characterization gives a better intuition of the result.We also characterized the solvability of k-Set Agreement in omissionadversaries by giving the number of omission faults a system can tolerate inorder to solve the problem on an underlying communication graph.Doing so, we based our result on a topological method that we extended to ourgraphical models.Finally, we studied in a second part some approximate variations of the k-SetAgreement problem.In this approximate setting, the decision values are required to be close toone another, based on some precise conditions.Several variations were studied, most notably an asymptotic version thatdoesn't requires processes to explicitly terminatebut rather requires a certain type of convergence of the values.Theses results shows the diversity and intricacy of the questions that are atstake
Yang, Q. "Secure message transmission in the general adversary model." Thesis, University College London (University of London), 2011. http://discovery.ucl.ac.uk/1334691/.
Full textBooks on the topic "Adversaire de message"
Thomas, Damion. Goodwill Ambassadors. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252038877.003.0007.
Full textForest, James J. F. Influence Warfare. Greenwood Publishing Group, Inc., 2009. http://dx.doi.org/10.5040/9798400670046.
Full textBook chapters on the topic "Adversaire de message"
Raynal, Michel. "Message Adversaries." In Encyclopedia of Algorithms, 1272–76. New York, NY: Springer New York, 2016. http://dx.doi.org/10.1007/978-1-4939-2864-4_609.
Full textRaynal, Michel. "Message Adversaries." In Encyclopedia of Algorithms, 1–6. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-642-27848-8_609-1.
Full textSerjantov, Andrei, and Steven J. Murdoch. "Message Splitting Against the Partial Adversary." In Privacy Enhancing Technologies, 26–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11767831_3.
Full textFujita, Maiki, Kenji Yasunaga, and Takeshi Koshiba. "Perfectly Secure Message Transmission Against Rational Timid Adversaries." In Lecture Notes in Computer Science, 127–44. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01554-1_8.
Full textYasunaga, Kenji, and Takeshi Koshiba. "Perfectly Secure Message Transmission Against Independent Rational Adversaries." In Lecture Notes in Computer Science, 563–82. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32430-8_33.
Full textWinkler, Kyrill, Ulrich Schmid, and Thomas Nowak. "Valency-Based Consensus Under Message Adversaries Without Limit-Closure." In Fundamentals of Computation Theory, 457–74. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-86593-1_32.
Full textMaffei, Ivo, and Andrew W. Roscoe. "Optimally-Fair Exchange of Secrets via Delay Encryption and Commutative Blinding." In Financial Cryptography and Data Security, 94–111. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-47754-6_6.
Full textSchmid, Ulrich, Manfred Schwarz, and Kyrill Winkler. "On the Strongest Message Adversary for Consensus in Directed Dynamic Networks." In Structural Information and Communication Complexity, 102–20. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01325-7_13.
Full textChoudhury, Ashish, Kaoru Kurosawa, and Arpita Patra. "Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary." In Applied Cryptography and Network Security, 292–308. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21554-4_17.
Full textSafavi-Naini, Reihaneh, and Mohammed Ashraful Alam Tuhin. "Bounds and Constructions for 1-Round (0,δ)-Secure Message Transmission against Generalized Adversary." In Progress in Cryptology - AFRICACRYPT 2012, 82–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31410-0_6.
Full textConference papers on the topic "Adversaire de message"
Schwarz, Manfred, Kyrill Winkler, and Ulrich Schmid. "Fast consensus under eventually stabilizing message adversaries." In ICDCN '16: 17th International Conference on Distributed Computing and Networking. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2833312.2833323.
Full textBlacksttone, Jeremy, and Wayne Patterson. "Isolating Key Phrases to Identify Ransomware Attackers." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002200.
Full textNowak, Thomas, Ulrich Schmid, and Kyrill Winkler. "Topological Characterization of Consensus under General Message Adversaries." In PODC '19: ACM Symposium on Principles of Distributed Computing. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3293611.3331624.
Full textRaynal, Michel, and Julien Stainer. "Synchrony weakened by message adversaries vs asynchrony restricted by failure detectors." In the 2013 ACM symposium. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2484239.2484249.
Full textSrinathan, Kannan, Arpita Patra, Ashish Choudhary, and C. Pandu Rangan. "Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary." In the 4th International Symposium. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1533057.1533083.
Full textDobó, Robert. "Military Conflicts and Country Image: The Country Image of Belligerents in Light of Ukraine, a Demographic, Communication Channel and Political Preference Based Perspective." In 29th International Scientific Conference Strategic Management and Decision Support Systems in Strategic Management. University of Novi Sad, Faculty of Economics in Subotica, 2024. http://dx.doi.org/10.46541/978-86-7233-428-9_404.
Full textHanley, Daniel, Jeff King, and André dos Santos. "Defeating Malicious Terminals in an Electronic Voting System." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2005. http://dx.doi.org/10.5753/sbseg.2005.21527.
Full textGurbuz, Mustafa. "PERFORMING MORAL OPPOSITION: MUSINGS ON THE STRATEGY AND IDENTITY IN THE GÜLEN MOVEMENT." In Muslim World in Transition: Contributions of the Gülen Movement. Leeds Metropolitan University Press, 2007. http://dx.doi.org/10.55207/hzit2119.
Full text