Journal articles on the topic 'Message adversary'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Message adversary.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
TONIEN, DONGVU, REIHANEH SAFAVI-NAINI, and PETER WILD. "ON "THE POWER OF VERIFICATION QUERIES" IN UNCONDITIONALLY SECURE MESSAGE AUTHENTICATION." Discrete Mathematics, Algorithms and Applications 03, no. 03 (September 2011): 287–303. http://dx.doi.org/10.1142/s1793830911001218.
Full textHaroutunian, Mariam, Parandzem Hakobyan, and Arman Avetisyan. "Two-Stage Optimal Hypotheses Testing for a Model of Stegosystem with an Active Adversary." JUCS - Journal of Universal Computer Science 29, no. 11 (November 28, 2023): 1254–73. http://dx.doi.org/10.3897/jucs.112913.
Full textAkhmetzyanova, Liliya R., and Alexandra A. Babueva. "On the unforgeability of the Chaum - Pedersen blind signature scheme." Prikladnaya Diskretnaya Matematika, no. 65 (2024): 41–65. http://dx.doi.org/10.17223/20710410/65/3.
Full textGuo, Li, and Gang Yao. "Protocols for Message Authentication from a Weak Secret." Applied Mechanics and Materials 380-384 (August 2013): 2892–96. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2892.
Full textRyabko, Boris. "Unconditionally Secure Ciphers with a Short Key for a Source with Unknown Statistics." Entropy 25, no. 10 (September 30, 2023): 1406. http://dx.doi.org/10.3390/e25101406.
Full textPatra, Arpita, Ashish Choudhary, C. Pandu Rangan, Kannan Srinathan, and Prasad Raghavendra. "Perfectly reliable and secure message transmission tolerating mobile adversary." International Journal of Applied Cryptography 1, no. 3 (2009): 200. http://dx.doi.org/10.1504/ijact.2009.023467.
Full textHu, Zhi Wen, Xian Ming Wang, Tao Tao Lv, Shan Shan Zhao, and Rui Jun Jing. "Random Linear Network Coding with Probabilistic Polynomial-Time Wiretap Adversary." Applied Mechanics and Materials 556-562 (May 2014): 6354–57. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6354.
Full textZhong, Sheng. "An Efficient and Secure Cryptosystem for Encrypting Long Messages." Fundamenta Informaticae 71, no. 4 (January 2006): 493–97. https://doi.org/10.3233/fun-2006-71407.
Full textBishara, Azmi. "The Quest for Strategy." Journal of Palestine Studies 32, no. 2 (January 1, 2003): 41–49. http://dx.doi.org/10.1525/jps.2003.32.2.41.
Full textPriya R., Sathiya, and V. Gokulakrishnan. "Effectively Secure Data Retrieving for Using Three Different Level Security." International Journal of Advance Research and Innovation 3, no. 2 (2015): 49–53. http://dx.doi.org/10.51976/ijari.321512.
Full textTONIEN, DONGVU, REIHANEH SAFAVI-NAINI, and PETER NICKOLAS. "BREAKING AND REPAIRING AN APPROXIMATE MESSAGE AUTHENTICATION SCHEME." Discrete Mathematics, Algorithms and Applications 03, no. 03 (September 2011): 393–412. http://dx.doi.org/10.1142/s1793830911001292.
Full textKurosawa, Kaoru. "Round-efficient perfectly secure message transmission scheme against general adversary." Designs, Codes and Cryptography 63, no. 2 (July 17, 2011): 199–207. http://dx.doi.org/10.1007/s10623-011-9546-5.
Full textLiu, Muhua, and Ping Zhang. "An Adaptively Secure Functional Encryption for Randomized Functions." Computer Journal 63, no. 8 (August 2020): 1247–58. http://dx.doi.org/10.1093/comjnl/bxz154.
Full textCAI, XIAO-QIU, and QING-QING LIU. "ROBUST MESSAGE AUTHENTICATION OVER A COLLECTIVE-NOISE CHANNEL." International Journal of Quantum Information 10, no. 06 (September 2012): 1250064. http://dx.doi.org/10.1142/s0219749912500645.
Full textOmolara, Abiodun Esther, and Aman Jantan. "Modified honey encryption scheme for encoding natural language message." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 3 (June 1, 2019): 1871. http://dx.doi.org/10.11591/ijece.v9i3.pp1871-1878.
Full textBoddu, Naresh Goud, and Upendra Kapshikar. "Tamper Detection against Unitary Operators." Quantum 7 (November 8, 2023): 1178. http://dx.doi.org/10.22331/q-2023-11-08-1178.
Full textNoh, Geontae, Ji Young Chun, and Ik Rae Jeong. "Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model." Journal of Applied Mathematics 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/371924.
Full textShi, Wenbo, Debiao He, and Peng Gong. "On the Security of a Certificateless Proxy Signature Scheme with Message Recovery." Mathematical Problems in Engineering 2013 (2013): 1–4. http://dx.doi.org/10.1155/2013/761694.
Full textAndrighetto, Luca, Samer Halabi, and Arie Nadler. "Fostering trust and forgiveness through the acknowledgment of others’ past victimization." Journal of Social and Political Psychology 5, no. 2 (February 1, 2018): 651–64. http://dx.doi.org/10.5964/jspp.v5i2.728.
Full textHuang, Chin-Tser, Mohamed G. Gouda, and E. N. Elnozahy. "Convergence of IPsec in presence of resets." Journal of High Speed Networks 15, no. 2 (January 2006): 173–83. https://doi.org/10.3233/hsn-2006-285.
Full textFranzoni, Federico, and Vanesa Daza. "Clover: An anonymous transaction relay protocol for the bitcoin P2P network." Peer-to-Peer Networking and Applications 15, no. 1 (October 6, 2021): 290–303. http://dx.doi.org/10.1007/s12083-021-01241-z.
Full textGu, Chen, Arshad Jhumka, and Carsten Maple. "Silence is Golden: A Source Location Privacy Scheme for Wireless Sensor Networks Based on Silent Nodes." Security and Communication Networks 2022 (November 18, 2022): 1–16. http://dx.doi.org/10.1155/2022/5026549.
Full textHosseini Beghaeiraveri, Seyed Amir, Mohammad Izadi, and Mohsen Rezvani. "Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing." Security and Communication Networks 2020 (August 1, 2020): 1–10. http://dx.doi.org/10.1155/2020/9428457.
Full textHuang, Zhenjie, Runlong Duan, Qunshan Chen, Hui Huang, and Yuping Zhou. "Secure Outsourced Attribute-Based Signatures with Perfect Anonymity in the Standard Model." Security and Communication Networks 2021 (October 16, 2021): 1–14. http://dx.doi.org/10.1155/2021/7884007.
Full textCahyadi, Eko Fajar, and Min-Shiang Hwang. "An improved efficient anonymous authentication with conditional privacy-preserving scheme for VANETs." PLOS ONE 16, no. 9 (September 10, 2021): e0257044. http://dx.doi.org/10.1371/journal.pone.0257044.
Full textKong, Fan Yu, and Jia Yu. "Key Substitution Attack and Malleability of a Short Signature Scheme with Batch Verification." Applied Mechanics and Materials 55-57 (May 2011): 1605–8. http://dx.doi.org/10.4028/www.scientific.net/amm.55-57.1605.
Full textLisova, Elena, Marina Gutiérrez, Wilfried Steiner, Elisabeth Uhlemann, Johan Åkerberg, Radu Dobrin, and Mats Björkman. "Protecting Clock Synchronization: Adversary Detection through Network Monitoring." Journal of Electrical and Computer Engineering 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/6297476.
Full textKumar, Boddupalli Anvesh, and V. Bapuji. "Efficient privacy preserving communication protocol for IOT applications." Brazilian Journal of Development 10, no. 1 (January 5, 2024): 402–19. http://dx.doi.org/10.34117/bjdv10n1-025.
Full textFeng, Tao, and Hong-Ru Bei. "Evaluation and Improvement of Internet Printing Protocol Based on HCPN Model Detection Method." Applied Sciences 13, no. 6 (March 8, 2023): 3467. http://dx.doi.org/10.3390/app13063467.
Full textSantoli, Thomas, and Christian Schaffner. "Using Simon's algorithm to attack symmetric-key cryptographic primitives." Quantum Information and Computation 17, no. 1&2 (January 2017): 65–78. http://dx.doi.org/10.26421/qic17.1-2-4.
Full textWang, Baocang, and Yupu Hu. "Signature Scheme Using the Root Extraction Problem on Quaternions." Journal of Applied Mathematics 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/819182.
Full textLazzaro, Sara, and Francesco Buccafurri. "Stealthy Messaging: Leveraging Message Queuing Telemetry Transport for Covert Communication Channels." Applied Sciences 14, no. 19 (October 2, 2024): 8874. http://dx.doi.org/10.3390/app14198874.
Full textSaifan, Ramzi, and Omar Al-Jarrah. "A Novel Algorithm for Defending Path-Based Denial of Service Attacks in Sensor Networks." International Journal of Distributed Sensor Networks 6, no. 1 (January 1, 2010): 793981. http://dx.doi.org/10.1155/2010/793981.
Full textKiryukhin, Vitaly A., and Andrey M. Sergeev. "“Sandwich”-like keyed algorithm based on the “Streebog” hash function." Prikladnaya Diskretnaya Matematika, no. 63 (2024): 24–48. http://dx.doi.org/10.17223/20710410/63/2.
Full textUllah, Ikram, Munam Ali Shah, Abid Khan, Carsten Maple, and Abdul Waheed. "Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs." Sensors 21, no. 9 (April 28, 2021): 3077. http://dx.doi.org/10.3390/s21093077.
Full textCheng, Zishuai, Mihai Ordean, Flavio Garcia, Baojiang Cui, and Dominik Rys. "Watching your call: Breaking VoLTE Privacy in LTE/5G Networks." Proceedings on Privacy Enhancing Technologies 2023, no. 2 (April 2023): 282–97. http://dx.doi.org/10.56553/popets-2023-0053.
Full textMartin, Keith M., Maura B. Paterson, and Douglas R. Stinson. "Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures." Cryptography and Communications 3, no. 2 (December 15, 2010): 65–86. http://dx.doi.org/10.1007/s12095-010-0039-6.
Full textGonzález Muñiz, Madeline, and Rainer Steinwndt. "Security of signature schemes in the presence of key-dependent messages." Tatra Mountains Mathematical Publications 47, no. 1 (December 1, 2010): 15–29. http://dx.doi.org/10.2478/v10127-010-0029-2.
Full textChen, Dong, Wei Lu, Weiwei Xing, and Na Wang. "An Untraceable Data Sharing Scheme in Wireless Sensor Networks." Sensors 19, no. 1 (December 31, 2018): 114. http://dx.doi.org/10.3390/s19010114.
Full textKim, Jongkil, Yang-Wai Chow, Willy Susilo, Joonsang Baek, and Intae Kim. "Functional Encryption for Pattern Matching with a Hidden String." Cryptography 6, no. 1 (December 31, 2021): 1. http://dx.doi.org/10.3390/cryptography6010001.
Full textWang, Chen. "Some Thoughts on Strong Unforgeability in Ring Signature Schemes." Advanced Materials Research 457-458 (January 2012): 773–79. http://dx.doi.org/10.4028/www.scientific.net/amr.457-458.773.
Full textZhao, Nan Nan, and Jian Bo Yao. "Mobile-Base-Station Location Privacy Based on Greedy Random Walk in WSN." Applied Mechanics and Materials 427-429 (September 2013): 2502–7. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2502.
Full textZhang, Jun. "Bidirectional Random Walk Based Mobile-Sink-LocationPrivacyin WSN." Applied Mechanics and Materials 529 (June 2014): 730–34. http://dx.doi.org/10.4028/www.scientific.net/amm.529.730.
Full textXia, Qi, Chun Xiang Xu, and Yong Yu. "Key Replacement Attack on Two Certificateless Signature Schemes without Random Oracles." Key Engineering Materials 439-440 (June 2010): 1606–11. http://dx.doi.org/10.4028/www.scientific.net/kem.439-440.1606.
Full textYi, Chuanjun. "En-Route Message Authentication Scheme for Filtering False Data in WSNs." Security and Communication Networks 2021 (September 11, 2021): 1–18. http://dx.doi.org/10.1155/2021/4068507.
Full textMartin, Jeremy, Douglas Alpuche, Kristina Bodeman, Lamont Brown, Ellis Fenske, Lucas Foppe, Travis Mayberry, Erik Rye, Brandon Sipes, and Sam Teplov. "Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol." Proceedings on Privacy Enhancing Technologies 2019, no. 4 (October 1, 2019): 34–53. http://dx.doi.org/10.2478/popets-2019-0057.
Full textZhao, Yong Fu, and Jian Bo Yao. "Bidirection Greedy Walk Based Mobile-Base-Station-Location Privacy in Wireless Sensor Networks." Applied Mechanics and Materials 427-429 (September 2013): 2497–501. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2497.
Full textOpitz, Marcus, Vidhi Chaudhri, and Yijing Wang. "Employee social-mediated crisis communication as opportunity or threat?" Corporate Communications: An International Journal 23, no. 1 (February 5, 2018): 66–83. http://dx.doi.org/10.1108/ccij-07-2017-0069.
Full textYang, Ling, Weiwei Yang, Liang Tang, Jia Tu, Xingbo Lu, and Zhengyun He. "Beamforming Design and Covert Performance Analysis for Full-Duplex Multiantenna System." Complexity 2021 (October 7, 2021): 1–10. http://dx.doi.org/10.1155/2021/8806874.
Full textFaust, Sebastian, Pratyay Mukherjee, Jesper Buus Nielsen, and Daniele Venturi. "Continuously Non-malleable Codes in the Split-State Model." Journal of Cryptology 33, no. 4 (July 24, 2020): 2034–77. http://dx.doi.org/10.1007/s00145-020-09362-z.
Full text