Journal articles on the topic 'Adversaire de message'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Adversaire de message.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Saindon, Marcelle. "Le Buddha comme neuvième avatāra du dieu hindou Visnu." Studies in Religion/Sciences Religieuses 32, no. 3 (September 2003): 299–310. http://dx.doi.org/10.1177/000842980303200304.
Full textFrémeaux, Jacques. "Abd el-Kader, chef de guerre (1832-1847)." Revue Historique des Armées 250, no. 1 (January 1, 2008): 100–107. http://dx.doi.org/10.3917/rha.250.0100.
Full textShi, Wenbo, Debiao He, and Peng Gong. "On the Security of a Certificateless Proxy Signature Scheme with Message Recovery." Mathematical Problems in Engineering 2013 (2013): 1–4. http://dx.doi.org/10.1155/2013/761694.
Full textTONIEN, DONGVU, REIHANEH SAFAVI-NAINI, and PETER WILD. "ON "THE POWER OF VERIFICATION QUERIES" IN UNCONDITIONALLY SECURE MESSAGE AUTHENTICATION." Discrete Mathematics, Algorithms and Applications 03, no. 03 (September 2011): 287–303. http://dx.doi.org/10.1142/s1793830911001218.
Full textNoh, Geontae, Ji Young Chun, and Ik Rae Jeong. "Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model." Journal of Applied Mathematics 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/371924.
Full textMartin, Jeremy, Douglas Alpuche, Kristina Bodeman, Lamont Brown, Ellis Fenske, Lucas Foppe, Travis Mayberry, Erik Rye, Brandon Sipes, and Sam Teplov. "Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol." Proceedings on Privacy Enhancing Technologies 2019, no. 4 (October 1, 2019): 34–53. http://dx.doi.org/10.2478/popets-2019-0057.
Full textGodard, Emmanuel, and Eloi Perdereau. "Back to the Coordinated Attack Problem." Mathematical Structures in Computer Science 30, no. 10 (November 2020): 1089–113. http://dx.doi.org/10.1017/s0960129521000037.
Full textHosseini Beghaeiraveri, Seyed Amir, Mohammad Izadi, and Mohsen Rezvani. "Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing." Security and Communication Networks 2020 (August 1, 2020): 1–10. http://dx.doi.org/10.1155/2020/9428457.
Full textCheng, Zishuai, Mihai Ordean, Flavio Garcia, Baojiang Cui, and Dominik Rys. "Watching your call: Breaking VoLTE Privacy in LTE/5G Networks." Proceedings on Privacy Enhancing Technologies 2023, no. 2 (April 2023): 282–97. http://dx.doi.org/10.56553/popets-2023-0053.
Full textZhong, Sheng. "An Efficient and Secure Cryptosystem for Encrypting Long Messages." Fundamenta Informaticae 71, no. 4 (January 2006): 493–97. https://doi.org/10.3233/fun-2006-71407.
Full textPriya R., Sathiya, and V. Gokulakrishnan. "Effectively Secure Data Retrieving for Using Three Different Level Security." International Journal of Advance Research and Innovation 3, no. 2 (2015): 49–53. http://dx.doi.org/10.51976/ijari.321512.
Full textGuo, Li, and Gang Yao. "Protocols for Message Authentication from a Weak Secret." Applied Mechanics and Materials 380-384 (August 2013): 2892–96. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2892.
Full textRyabko, Boris. "Unconditionally Secure Ciphers with a Short Key for a Source with Unknown Statistics." Entropy 25, no. 10 (September 30, 2023): 1406. http://dx.doi.org/10.3390/e25101406.
Full textHuang, Chin-Tser, Mohamed G. Gouda, and E. N. Elnozahy. "Convergence of IPsec in presence of resets." Journal of High Speed Networks 15, no. 2 (January 2006): 173–83. https://doi.org/10.3233/hsn-2006-285.
Full textTONIEN, DONGVU, REIHANEH SAFAVI-NAINI, and PETER NICKOLAS. "BREAKING AND REPAIRING AN APPROXIMATE MESSAGE AUTHENTICATION SCHEME." Discrete Mathematics, Algorithms and Applications 03, no. 03 (September 2011): 393–412. http://dx.doi.org/10.1142/s1793830911001292.
Full textOmolara, Abiodun Esther, and Aman Jantan. "Modified honey encryption scheme for encoding natural language message." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 3 (June 1, 2019): 1871. http://dx.doi.org/10.11591/ijece.v9i3.pp1871-1878.
Full textNoh, Jaewon, Sangil Jeon, and Sunghyun Cho. "Distributed Blockchain-Based Message Authentication Scheme for Connected Vehicles." Electronics 9, no. 1 (January 1, 2020): 74. http://dx.doi.org/10.3390/electronics9010074.
Full textGhaleb, Fuad A., Waleed Ali, Bander Ali Saleh Al-Rimy, and Sharaf J. Malebary. "Intelligent Proof-of-Trustworthiness-Based Secure Safety Message Dissemination Scheme for Vehicular Ad Hoc Networks Using Blockchain and Deep Learning Techniques." Mathematics 11, no. 7 (April 2, 2023): 1704. http://dx.doi.org/10.3390/math11071704.
Full textAndrighetto, Luca, Samer Halabi, and Arie Nadler. "Fostering trust and forgiveness through the acknowledgment of others’ past victimization." Journal of Social and Political Psychology 5, no. 2 (February 1, 2018): 651–64. http://dx.doi.org/10.5964/jspp.v5i2.728.
Full textAlhassan, Salamudeen, Mohammed Ibrahim Daabo, and Gabriel Kofi Armah. "Twin K-Shuffle Based Audio Steganography." Asian Journal of Engineering and Applied Technology 11, no. 1 (June 1, 2022): 1–4. http://dx.doi.org/10.51983/ajeat-2022.11.1.3200.
Full textHu, Zhi Wen, Xian Ming Wang, Tao Tao Lv, Shan Shan Zhao, and Rui Jun Jing. "Random Linear Network Coding with Probabilistic Polynomial-Time Wiretap Adversary." Applied Mechanics and Materials 556-562 (May 2014): 6354–57. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6354.
Full textGu, Chen, Arshad Jhumka, and Carsten Maple. "Silence is Golden: A Source Location Privacy Scheme for Wireless Sensor Networks Based on Silent Nodes." Security and Communication Networks 2022 (November 18, 2022): 1–16. http://dx.doi.org/10.1155/2022/5026549.
Full textCahyadi, Eko Fajar, and Min-Shiang Hwang. "An improved efficient anonymous authentication with conditional privacy-preserving scheme for VANETs." PLOS ONE 16, no. 9 (September 10, 2021): e0257044. http://dx.doi.org/10.1371/journal.pone.0257044.
Full textTirado-García, Alejandra. "The Negative Campaign on Telegram: The Political Use of Criticism during the 2021 Community of Madrid Elections." Social Sciences 12, no. 2 (February 11, 2023): 93. http://dx.doi.org/10.3390/socsci12020093.
Full textLauer, Sebastian, Kai Gellert, Robert Merget, Tobias Handirk, and Jörg Schwenk. "T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction." Proceedings on Privacy Enhancing Technologies 2020, no. 2 (April 1, 2020): 336–57. http://dx.doi.org/10.2478/popets-2020-0030.
Full textHaroutunian, Mariam, Parandzem Hakobyan, and Arman Avetisyan. "Two-Stage Optimal Hypotheses Testing for a Model of Stegosystem with an Active Adversary." JUCS - Journal of Universal Computer Science 29, no. 11 (November 28, 2023): 1254–73. http://dx.doi.org/10.3897/jucs.112913.
Full textFranzoni, Federico, and Vanesa Daza. "Clover: An anonymous transaction relay protocol for the bitcoin P2P network." Peer-to-Peer Networking and Applications 15, no. 1 (October 6, 2021): 290–303. http://dx.doi.org/10.1007/s12083-021-01241-z.
Full textAkhmetzyanova, Liliya R., and Alexandra A. Babueva. "On the unforgeability of the Chaum - Pedersen blind signature scheme." Prikladnaya Diskretnaya Matematika, no. 65 (2024): 41–65. http://dx.doi.org/10.17223/20710410/65/3.
Full textDebnath, Ashmita, Pradheepkumar Singaravelu, and Shekhar Verma. "Efficient spatial privacy preserving scheme for sensor network." Open Engineering 3, no. 1 (January 1, 2013): 1–10. http://dx.doi.org/10.2478/s13531-012-0048-7.
Full textHuang, Zhenjie, Runlong Duan, Qunshan Chen, Hui Huang, and Yuping Zhou. "Secure Outsourced Attribute-Based Signatures with Perfect Anonymity in the Standard Model." Security and Communication Networks 2021 (October 16, 2021): 1–14. http://dx.doi.org/10.1155/2021/7884007.
Full textLin, Banks, Wayne Henry, and Richard Dill. "Defending Small Satellites from Malicious Cybersecurity Threats." International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 479–88. http://dx.doi.org/10.34190/iccws.17.1.60.
Full textLiu, Heyang. "Designing And Implementing a Chat System with Enhanced Security Via AES Encryption Methods." Highlights in Science, Engineering and Technology 85 (March 13, 2024): 480–86. http://dx.doi.org/10.54097/wkfk9p24.
Full textKumar, Boddupalli Anvesh, and V. Bapuji. "Efficient privacy preserving communication protocol for IOT applications." Brazilian Journal of Development 10, no. 1 (January 5, 2024): 402–19. http://dx.doi.org/10.34117/bjdv10n1-025.
Full textPatra, Arpita, Ashish Choudhary, C. Pandu Rangan, Kannan Srinathan, and Prasad Raghavendra. "Perfectly reliable and secure message transmission tolerating mobile adversary." International Journal of Applied Cryptography 1, no. 3 (2009): 200. http://dx.doi.org/10.1504/ijact.2009.023467.
Full textSantoli, Thomas, and Christian Schaffner. "Using Simon's algorithm to attack symmetric-key cryptographic primitives." Quantum Information and Computation 17, no. 1&2 (January 2017): 65–78. http://dx.doi.org/10.26421/qic17.1-2-4.
Full textBishara, Azmi. "The Quest for Strategy." Journal of Palestine Studies 32, no. 2 (January 1, 2003): 41–49. http://dx.doi.org/10.1525/jps.2003.32.2.41.
Full textAlawatugoda, Janaka. "Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions." Cryptography 7, no. 1 (January 5, 2023): 1. http://dx.doi.org/10.3390/cryptography7010001.
Full textKurosawa, Kaoru. "Round-efficient perfectly secure message transmission scheme against general adversary." Designs, Codes and Cryptography 63, no. 2 (July 17, 2011): 199–207. http://dx.doi.org/10.1007/s10623-011-9546-5.
Full textGonzález Muñiz, Madeline, and Rainer Steinwndt. "Security of signature schemes in the presence of key-dependent messages." Tatra Mountains Mathematical Publications 47, no. 1 (December 1, 2010): 15–29. http://dx.doi.org/10.2478/v10127-010-0029-2.
Full textLiu, Muhua, and Ping Zhang. "An Adaptively Secure Functional Encryption for Randomized Functions." Computer Journal 63, no. 8 (August 2020): 1247–58. http://dx.doi.org/10.1093/comjnl/bxz154.
Full textCoulouma, Étienne, Emmanuel Godard, and Joseph Peters. "A characterization of oblivious message adversaries for which Consensus is solvable." Theoretical Computer Science 584 (June 2015): 80–90. http://dx.doi.org/10.1016/j.tcs.2015.01.024.
Full textCAI, XIAO-QIU, and QING-QING LIU. "ROBUST MESSAGE AUTHENTICATION OVER A COLLECTIVE-NOISE CHANNEL." International Journal of Quantum Information 10, no. 06 (September 2012): 1250064. http://dx.doi.org/10.1142/s0219749912500645.
Full textSafavi-Naini, Reihaneh, Alireza Poostindouz, and Viliam Lisy. "Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication." Security and Communication Networks 2018 (May 7, 2018): 1–15. http://dx.doi.org/10.1155/2018/8475818.
Full textFügger, Matthias, Thomas Nowak, and Manfred Schwarz. "Tight Bounds for Asymptotic and Approximate Consensus." Journal of the ACM 68, no. 6 (December 31, 2021): 1–35. http://dx.doi.org/10.1145/3485242.
Full textBoddu, Naresh Goud, and Upendra Kapshikar. "Tamper Detection against Unitary Operators." Quantum 7 (November 8, 2023): 1178. http://dx.doi.org/10.22331/q-2023-11-08-1178.
Full textLazzaro, Sara, and Francesco Buccafurri. "Stealthy Messaging: Leveraging Message Queuing Telemetry Transport for Covert Communication Channels." Applied Sciences 14, no. 19 (October 2, 2024): 8874. http://dx.doi.org/10.3390/app14198874.
Full textDe Santis, Alfredo, Anna Lisa Ferrara, Manuela Flores, and Barbara Masucci. "Continuous Entity Authentication in the Internet of Things Scenario." Applied Sciences 13, no. 10 (May 11, 2023): 5945. http://dx.doi.org/10.3390/app13105945.
Full textUllah, Ikram, Munam Ali Shah, Abid Khan, Carsten Maple, and Abdul Waheed. "Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs." Sensors 21, no. 9 (April 28, 2021): 3077. http://dx.doi.org/10.3390/s21093077.
Full textGhafoor, AtaUllah, Muhammad Sher, Muhammad Imran, and Imran Baig. "Disjoint Key Establishment Protocol for Wireless Sensor and Actor Networks." Journal of Sensors 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/5071617.
Full textHu, Xiang Dong, and Peng Qin Yu. "Detection of False Data Injection Attack in the Internet of Things." Advanced Materials Research 452-453 (January 2012): 932–36. http://dx.doi.org/10.4028/www.scientific.net/amr.452-453.932.
Full text