Literatura académica sobre el tema "Adversaire de message"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Adversaire de message".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Adversaire de message"
Saindon, Marcelle. "Le Buddha comme neuvième avatāra du dieu hindou Visnu". Studies in Religion/Sciences Religieuses 32, n.º 3 (septiembre de 2003): 299–310. http://dx.doi.org/10.1177/000842980303200304.
Texto completoFrémeaux, Jacques. "Abd el-Kader, chef de guerre (1832-1847)". Revue Historique des Armées 250, n.º 1 (1 de enero de 2008): 100–107. http://dx.doi.org/10.3917/rha.250.0100.
Texto completoShi, Wenbo, Debiao He y Peng Gong. "On the Security of a Certificateless Proxy Signature Scheme with Message Recovery". Mathematical Problems in Engineering 2013 (2013): 1–4. http://dx.doi.org/10.1155/2013/761694.
Texto completoTONIEN, DONGVU, REIHANEH SAFAVI-NAINI y PETER WILD. "ON "THE POWER OF VERIFICATION QUERIES" IN UNCONDITIONALLY SECURE MESSAGE AUTHENTICATION". Discrete Mathematics, Algorithms and Applications 03, n.º 03 (septiembre de 2011): 287–303. http://dx.doi.org/10.1142/s1793830911001218.
Texto completoNoh, Geontae, Ji Young Chun y Ik Rae Jeong. "Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model". Journal of Applied Mathematics 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/371924.
Texto completoMartin, Jeremy, Douglas Alpuche, Kristina Bodeman, Lamont Brown, Ellis Fenske, Lucas Foppe, Travis Mayberry, Erik Rye, Brandon Sipes y Sam Teplov. "Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol". Proceedings on Privacy Enhancing Technologies 2019, n.º 4 (1 de octubre de 2019): 34–53. http://dx.doi.org/10.2478/popets-2019-0057.
Texto completoGodard, Emmanuel y Eloi Perdereau. "Back to the Coordinated Attack Problem". Mathematical Structures in Computer Science 30, n.º 10 (noviembre de 2020): 1089–113. http://dx.doi.org/10.1017/s0960129521000037.
Texto completoHosseini Beghaeiraveri, Seyed Amir, Mohammad Izadi y Mohsen Rezvani. "Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing". Security and Communication Networks 2020 (1 de agosto de 2020): 1–10. http://dx.doi.org/10.1155/2020/9428457.
Texto completoCheng, Zishuai, Mihai Ordean, Flavio Garcia, Baojiang Cui y Dominik Rys. "Watching your call: Breaking VoLTE Privacy in LTE/5G Networks". Proceedings on Privacy Enhancing Technologies 2023, n.º 2 (abril de 2023): 282–97. http://dx.doi.org/10.56553/popets-2023-0053.
Texto completoZhong, Sheng. "An Efficient and Secure Cryptosystem for Encrypting Long Messages". Fundamenta Informaticae 71, n.º 4 (enero de 2006): 493–97. https://doi.org/10.3233/fun-2006-71407.
Texto completoTesis sobre el tema "Adversaire de message"
Albouy, Timothé. "Foundations of reliable cooperation under asynchrony, Byzantine faults, and message adversaries". Electronic Thesis or Diss., Université de Rennes (2023-....), 2024. http://www.theses.fr/2024URENS062.
Texto completoThis thesis explores fault-tolerant distributed systems. It focuses more specifically on implementing reliable broadcast in asynchronous environments prone to hybrid failures. We introduce a novel computing model combining Byzantine process failures with a message adversary. We then define the Message-Adversary-tolerant Byzantine Reliable Broadcast (MBRB) abstraction and prove its optimal resilience condition. We present three key algorithms implementing this abstraction: a simple signature-based MBRB algorithm, a new primitive called k2l-cast for cryptography-free MBRB implementations, and an erasure-coding-based MBRB algorithm optimizing communication complexity. These contributions advance the understanding of fault-tolerant distributed systems and provide a foundation for designing resilient and efficient distributed algorithms, with applications in critical infrastructures, financial systems, and blockchain technologies
Perdereau, Eloi. "Accords exacts et approchés pour les adversaires de message". Electronic Thesis or Diss., Aix-Marseille, 2021. http://www.theses.fr/2021AIXM0611.
Texto completoOur subject is about computability of distributed systems in the messageadversaries family of models.For this purpose, several mathematical approaches are carried out.For instance, based on recent advances in the subject, we use well knowntopological methods to solve our problems.But we also used geometric, combinatorial and dynamical systems methods.In the first part, we are interested in the Consensus problem and the k-SetAgreement.They are what we called exact agreements, i.e. the decision values must beamong the proposed ones.As a complement to FG11, we have characterized topologically the solvability ofthe Binary Consensus problem with two process in the general model of messageadversaries.This new characterization gives a better intuition of the result.We also characterized the solvability of k-Set Agreement in omissionadversaries by giving the number of omission faults a system can tolerate inorder to solve the problem on an underlying communication graph.Doing so, we based our result on a topological method that we extended to ourgraphical models.Finally, we studied in a second part some approximate variations of the k-SetAgreement problem.In this approximate setting, the decision values are required to be close toone another, based on some precise conditions.Several variations were studied, most notably an asymptotic version thatdoesn't requires processes to explicitly terminatebut rather requires a certain type of convergence of the values.Theses results shows the diversity and intricacy of the questions that are atstake
Yang, Q. "Secure message transmission in the general adversary model". Thesis, University College London (University of London), 2011. http://discovery.ucl.ac.uk/1334691/.
Texto completoLibros sobre el tema "Adversaire de message"
Thomas, Damion. Goodwill Ambassadors. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252038877.003.0007.
Texto completoForest, James J. F. Influence Warfare. Greenwood Publishing Group, Inc., 2009. http://dx.doi.org/10.5040/9798400670046.
Texto completoCapítulos de libros sobre el tema "Adversaire de message"
Raynal, Michel. "Message Adversaries". En Encyclopedia of Algorithms, 1272–76. New York, NY: Springer New York, 2016. http://dx.doi.org/10.1007/978-1-4939-2864-4_609.
Texto completoRaynal, Michel. "Message Adversaries". En Encyclopedia of Algorithms, 1–6. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-642-27848-8_609-1.
Texto completoSerjantov, Andrei y Steven J. Murdoch. "Message Splitting Against the Partial Adversary". En Privacy Enhancing Technologies, 26–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11767831_3.
Texto completoFujita, Maiki, Kenji Yasunaga y Takeshi Koshiba. "Perfectly Secure Message Transmission Against Rational Timid Adversaries". En Lecture Notes in Computer Science, 127–44. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01554-1_8.
Texto completoYasunaga, Kenji y Takeshi Koshiba. "Perfectly Secure Message Transmission Against Independent Rational Adversaries". En Lecture Notes in Computer Science, 563–82. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32430-8_33.
Texto completoWinkler, Kyrill, Ulrich Schmid y Thomas Nowak. "Valency-Based Consensus Under Message Adversaries Without Limit-Closure". En Fundamentals of Computation Theory, 457–74. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-86593-1_32.
Texto completoMaffei, Ivo y Andrew W. Roscoe. "Optimally-Fair Exchange of Secrets via Delay Encryption and Commutative Blinding". En Financial Cryptography and Data Security, 94–111. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-47754-6_6.
Texto completoSchmid, Ulrich, Manfred Schwarz y Kyrill Winkler. "On the Strongest Message Adversary for Consensus in Directed Dynamic Networks". En Structural Information and Communication Complexity, 102–20. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01325-7_13.
Texto completoChoudhury, Ashish, Kaoru Kurosawa y Arpita Patra. "Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary". En Applied Cryptography and Network Security, 292–308. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21554-4_17.
Texto completoSafavi-Naini, Reihaneh y Mohammed Ashraful Alam Tuhin. "Bounds and Constructions for 1-Round (0,δ)-Secure Message Transmission against Generalized Adversary". En Progress in Cryptology - AFRICACRYPT 2012, 82–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31410-0_6.
Texto completoActas de conferencias sobre el tema "Adversaire de message"
Schwarz, Manfred, Kyrill Winkler y Ulrich Schmid. "Fast consensus under eventually stabilizing message adversaries". En ICDCN '16: 17th International Conference on Distributed Computing and Networking. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2833312.2833323.
Texto completoBlacksttone, Jeremy y Wayne Patterson. "Isolating Key Phrases to Identify Ransomware Attackers". En 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002200.
Texto completoNowak, Thomas, Ulrich Schmid y Kyrill Winkler. "Topological Characterization of Consensus under General Message Adversaries". En PODC '19: ACM Symposium on Principles of Distributed Computing. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3293611.3331624.
Texto completoRaynal, Michel y Julien Stainer. "Synchrony weakened by message adversaries vs asynchrony restricted by failure detectors". En the 2013 ACM symposium. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2484239.2484249.
Texto completoSrinathan, Kannan, Arpita Patra, Ashish Choudhary y C. Pandu Rangan. "Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary". En the 4th International Symposium. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1533057.1533083.
Texto completoDobó, Robert. "Military Conflicts and Country Image: The Country Image of Belligerents in Light of Ukraine, a Demographic, Communication Channel and Political Preference Based Perspective". En 29th International Scientific Conference Strategic Management and Decision Support Systems in Strategic Management. University of Novi Sad, Faculty of Economics in Subotica, 2024. http://dx.doi.org/10.46541/978-86-7233-428-9_404.
Texto completoHanley, Daniel, Jeff King y André dos Santos. "Defeating Malicious Terminals in an Electronic Voting System". En Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2005. http://dx.doi.org/10.5753/sbseg.2005.21527.
Texto completoGurbuz, Mustafa. "PERFORMING MORAL OPPOSITION: MUSINGS ON THE STRATEGY AND IDENTITY IN THE GÜLEN MOVEMENT". En Muslim World in Transition: Contributions of the Gülen Movement. Leeds Metropolitan University Press, 2007. http://dx.doi.org/10.55207/hzit2119.
Texto completo