Artículos de revistas sobre el tema "Adversaire de message"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Adversaire de message".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Saindon, Marcelle. "Le Buddha comme neuvième avatāra du dieu hindou Visnu". Studies in Religion/Sciences Religieuses 32, n.º 3 (septiembre de 2003): 299–310. http://dx.doi.org/10.1177/000842980303200304.
Texto completoFrémeaux, Jacques. "Abd el-Kader, chef de guerre (1832-1847)". Revue Historique des Armées 250, n.º 1 (1 de enero de 2008): 100–107. http://dx.doi.org/10.3917/rha.250.0100.
Texto completoShi, Wenbo, Debiao He y Peng Gong. "On the Security of a Certificateless Proxy Signature Scheme with Message Recovery". Mathematical Problems in Engineering 2013 (2013): 1–4. http://dx.doi.org/10.1155/2013/761694.
Texto completoTONIEN, DONGVU, REIHANEH SAFAVI-NAINI y PETER WILD. "ON "THE POWER OF VERIFICATION QUERIES" IN UNCONDITIONALLY SECURE MESSAGE AUTHENTICATION". Discrete Mathematics, Algorithms and Applications 03, n.º 03 (septiembre de 2011): 287–303. http://dx.doi.org/10.1142/s1793830911001218.
Texto completoNoh, Geontae, Ji Young Chun y Ik Rae Jeong. "Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model". Journal of Applied Mathematics 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/371924.
Texto completoMartin, Jeremy, Douglas Alpuche, Kristina Bodeman, Lamont Brown, Ellis Fenske, Lucas Foppe, Travis Mayberry, Erik Rye, Brandon Sipes y Sam Teplov. "Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol". Proceedings on Privacy Enhancing Technologies 2019, n.º 4 (1 de octubre de 2019): 34–53. http://dx.doi.org/10.2478/popets-2019-0057.
Texto completoGodard, Emmanuel y Eloi Perdereau. "Back to the Coordinated Attack Problem". Mathematical Structures in Computer Science 30, n.º 10 (noviembre de 2020): 1089–113. http://dx.doi.org/10.1017/s0960129521000037.
Texto completoHosseini Beghaeiraveri, Seyed Amir, Mohammad Izadi y Mohsen Rezvani. "Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing". Security and Communication Networks 2020 (1 de agosto de 2020): 1–10. http://dx.doi.org/10.1155/2020/9428457.
Texto completoCheng, Zishuai, Mihai Ordean, Flavio Garcia, Baojiang Cui y Dominik Rys. "Watching your call: Breaking VoLTE Privacy in LTE/5G Networks". Proceedings on Privacy Enhancing Technologies 2023, n.º 2 (abril de 2023): 282–97. http://dx.doi.org/10.56553/popets-2023-0053.
Texto completoZhong, Sheng. "An Efficient and Secure Cryptosystem for Encrypting Long Messages". Fundamenta Informaticae 71, n.º 4 (enero de 2006): 493–97. https://doi.org/10.3233/fun-2006-71407.
Texto completoPriya R., Sathiya y V. Gokulakrishnan. "Effectively Secure Data Retrieving for Using Three Different Level Security". International Journal of Advance Research and Innovation 3, n.º 2 (2015): 49–53. http://dx.doi.org/10.51976/ijari.321512.
Texto completoGuo, Li y Gang Yao. "Protocols for Message Authentication from a Weak Secret". Applied Mechanics and Materials 380-384 (agosto de 2013): 2892–96. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2892.
Texto completoRyabko, Boris. "Unconditionally Secure Ciphers with a Short Key for a Source with Unknown Statistics". Entropy 25, n.º 10 (30 de septiembre de 2023): 1406. http://dx.doi.org/10.3390/e25101406.
Texto completoHuang, Chin-Tser, Mohamed G. Gouda y E. N. Elnozahy. "Convergence of IPsec in presence of resets". Journal of High Speed Networks 15, n.º 2 (enero de 2006): 173–83. https://doi.org/10.3233/hsn-2006-285.
Texto completoTONIEN, DONGVU, REIHANEH SAFAVI-NAINI y PETER NICKOLAS. "BREAKING AND REPAIRING AN APPROXIMATE MESSAGE AUTHENTICATION SCHEME". Discrete Mathematics, Algorithms and Applications 03, n.º 03 (septiembre de 2011): 393–412. http://dx.doi.org/10.1142/s1793830911001292.
Texto completoOmolara, Abiodun Esther y Aman Jantan. "Modified honey encryption scheme for encoding natural language message". International Journal of Electrical and Computer Engineering (IJECE) 9, n.º 3 (1 de junio de 2019): 1871. http://dx.doi.org/10.11591/ijece.v9i3.pp1871-1878.
Texto completoNoh, Jaewon, Sangil Jeon y Sunghyun Cho. "Distributed Blockchain-Based Message Authentication Scheme for Connected Vehicles". Electronics 9, n.º 1 (1 de enero de 2020): 74. http://dx.doi.org/10.3390/electronics9010074.
Texto completoGhaleb, Fuad A., Waleed Ali, Bander Ali Saleh Al-Rimy y Sharaf J. Malebary. "Intelligent Proof-of-Trustworthiness-Based Secure Safety Message Dissemination Scheme for Vehicular Ad Hoc Networks Using Blockchain and Deep Learning Techniques". Mathematics 11, n.º 7 (2 de abril de 2023): 1704. http://dx.doi.org/10.3390/math11071704.
Texto completoAndrighetto, Luca, Samer Halabi y Arie Nadler. "Fostering trust and forgiveness through the acknowledgment of others’ past victimization". Journal of Social and Political Psychology 5, n.º 2 (1 de febrero de 2018): 651–64. http://dx.doi.org/10.5964/jspp.v5i2.728.
Texto completoAlhassan, Salamudeen, Mohammed Ibrahim Daabo y Gabriel Kofi Armah. "Twin K-Shuffle Based Audio Steganography". Asian Journal of Engineering and Applied Technology 11, n.º 1 (1 de junio de 2022): 1–4. http://dx.doi.org/10.51983/ajeat-2022.11.1.3200.
Texto completoHu, Zhi Wen, Xian Ming Wang, Tao Tao Lv, Shan Shan Zhao y Rui Jun Jing. "Random Linear Network Coding with Probabilistic Polynomial-Time Wiretap Adversary". Applied Mechanics and Materials 556-562 (mayo de 2014): 6354–57. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6354.
Texto completoGu, Chen, Arshad Jhumka y Carsten Maple. "Silence is Golden: A Source Location Privacy Scheme for Wireless Sensor Networks Based on Silent Nodes". Security and Communication Networks 2022 (18 de noviembre de 2022): 1–16. http://dx.doi.org/10.1155/2022/5026549.
Texto completoCahyadi, Eko Fajar y Min-Shiang Hwang. "An improved efficient anonymous authentication with conditional privacy-preserving scheme for VANETs". PLOS ONE 16, n.º 9 (10 de septiembre de 2021): e0257044. http://dx.doi.org/10.1371/journal.pone.0257044.
Texto completoTirado-García, Alejandra. "The Negative Campaign on Telegram: The Political Use of Criticism during the 2021 Community of Madrid Elections". Social Sciences 12, n.º 2 (11 de febrero de 2023): 93. http://dx.doi.org/10.3390/socsci12020093.
Texto completoLauer, Sebastian, Kai Gellert, Robert Merget, Tobias Handirk y Jörg Schwenk. "T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction". Proceedings on Privacy Enhancing Technologies 2020, n.º 2 (1 de abril de 2020): 336–57. http://dx.doi.org/10.2478/popets-2020-0030.
Texto completoHaroutunian, Mariam, Parandzem Hakobyan y Arman Avetisyan. "Two-Stage Optimal Hypotheses Testing for a Model of Stegosystem with an Active Adversary". JUCS - Journal of Universal Computer Science 29, n.º 11 (28 de noviembre de 2023): 1254–73. http://dx.doi.org/10.3897/jucs.112913.
Texto completoFranzoni, Federico y Vanesa Daza. "Clover: An anonymous transaction relay protocol for the bitcoin P2P network". Peer-to-Peer Networking and Applications 15, n.º 1 (6 de octubre de 2021): 290–303. http://dx.doi.org/10.1007/s12083-021-01241-z.
Texto completoAkhmetzyanova, Liliya R. y Alexandra A. Babueva. "On the unforgeability of the Chaum - Pedersen blind signature scheme". Prikladnaya Diskretnaya Matematika, n.º 65 (2024): 41–65. http://dx.doi.org/10.17223/20710410/65/3.
Texto completoDebnath, Ashmita, Pradheepkumar Singaravelu y Shekhar Verma. "Efficient spatial privacy preserving scheme for sensor network". Open Engineering 3, n.º 1 (1 de enero de 2013): 1–10. http://dx.doi.org/10.2478/s13531-012-0048-7.
Texto completoHuang, Zhenjie, Runlong Duan, Qunshan Chen, Hui Huang y Yuping Zhou. "Secure Outsourced Attribute-Based Signatures with Perfect Anonymity in the Standard Model". Security and Communication Networks 2021 (16 de octubre de 2021): 1–14. http://dx.doi.org/10.1155/2021/7884007.
Texto completoLin, Banks, Wayne Henry y Richard Dill. "Defending Small Satellites from Malicious Cybersecurity Threats". International Conference on Cyber Warfare and Security 17, n.º 1 (2 de marzo de 2022): 479–88. http://dx.doi.org/10.34190/iccws.17.1.60.
Texto completoLiu, Heyang. "Designing And Implementing a Chat System with Enhanced Security Via AES Encryption Methods". Highlights in Science, Engineering and Technology 85 (13 de marzo de 2024): 480–86. http://dx.doi.org/10.54097/wkfk9p24.
Texto completoKumar, Boddupalli Anvesh y V. Bapuji. "Efficient privacy preserving communication protocol for IOT applications". Brazilian Journal of Development 10, n.º 1 (5 de enero de 2024): 402–19. http://dx.doi.org/10.34117/bjdv10n1-025.
Texto completoPatra, Arpita, Ashish Choudhary, C. Pandu Rangan, Kannan Srinathan y Prasad Raghavendra. "Perfectly reliable and secure message transmission tolerating mobile adversary". International Journal of Applied Cryptography 1, n.º 3 (2009): 200. http://dx.doi.org/10.1504/ijact.2009.023467.
Texto completoSantoli, Thomas y Christian Schaffner. "Using Simon's algorithm to attack symmetric-key cryptographic primitives". Quantum Information and Computation 17, n.º 1&2 (enero de 2017): 65–78. http://dx.doi.org/10.26421/qic17.1-2-4.
Texto completoBishara, Azmi. "The Quest for Strategy". Journal of Palestine Studies 32, n.º 2 (1 de enero de 2003): 41–49. http://dx.doi.org/10.1525/jps.2003.32.2.41.
Texto completoAlawatugoda, Janaka. "Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions". Cryptography 7, n.º 1 (5 de enero de 2023): 1. http://dx.doi.org/10.3390/cryptography7010001.
Texto completoKurosawa, Kaoru. "Round-efficient perfectly secure message transmission scheme against general adversary". Designs, Codes and Cryptography 63, n.º 2 (17 de julio de 2011): 199–207. http://dx.doi.org/10.1007/s10623-011-9546-5.
Texto completoGonzález Muñiz, Madeline y Rainer Steinwndt. "Security of signature schemes in the presence of key-dependent messages". Tatra Mountains Mathematical Publications 47, n.º 1 (1 de diciembre de 2010): 15–29. http://dx.doi.org/10.2478/v10127-010-0029-2.
Texto completoLiu, Muhua y Ping Zhang. "An Adaptively Secure Functional Encryption for Randomized Functions". Computer Journal 63, n.º 8 (agosto de 2020): 1247–58. http://dx.doi.org/10.1093/comjnl/bxz154.
Texto completoCoulouma, Étienne, Emmanuel Godard y Joseph Peters. "A characterization of oblivious message adversaries for which Consensus is solvable". Theoretical Computer Science 584 (junio de 2015): 80–90. http://dx.doi.org/10.1016/j.tcs.2015.01.024.
Texto completoCAI, XIAO-QIU y QING-QING LIU. "ROBUST MESSAGE AUTHENTICATION OVER A COLLECTIVE-NOISE CHANNEL". International Journal of Quantum Information 10, n.º 06 (septiembre de 2012): 1250064. http://dx.doi.org/10.1142/s0219749912500645.
Texto completoSafavi-Naini, Reihaneh, Alireza Poostindouz y Viliam Lisy. "Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication". Security and Communication Networks 2018 (7 de mayo de 2018): 1–15. http://dx.doi.org/10.1155/2018/8475818.
Texto completoFügger, Matthias, Thomas Nowak y Manfred Schwarz. "Tight Bounds for Asymptotic and Approximate Consensus". Journal of the ACM 68, n.º 6 (31 de diciembre de 2021): 1–35. http://dx.doi.org/10.1145/3485242.
Texto completoBoddu, Naresh Goud y Upendra Kapshikar. "Tamper Detection against Unitary Operators". Quantum 7 (8 de noviembre de 2023): 1178. http://dx.doi.org/10.22331/q-2023-11-08-1178.
Texto completoLazzaro, Sara y Francesco Buccafurri. "Stealthy Messaging: Leveraging Message Queuing Telemetry Transport for Covert Communication Channels". Applied Sciences 14, n.º 19 (2 de octubre de 2024): 8874. http://dx.doi.org/10.3390/app14198874.
Texto completoDe Santis, Alfredo, Anna Lisa Ferrara, Manuela Flores y Barbara Masucci. "Continuous Entity Authentication in the Internet of Things Scenario". Applied Sciences 13, n.º 10 (11 de mayo de 2023): 5945. http://dx.doi.org/10.3390/app13105945.
Texto completoUllah, Ikram, Munam Ali Shah, Abid Khan, Carsten Maple y Abdul Waheed. "Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs". Sensors 21, n.º 9 (28 de abril de 2021): 3077. http://dx.doi.org/10.3390/s21093077.
Texto completoGhafoor, AtaUllah, Muhammad Sher, Muhammad Imran y Imran Baig. "Disjoint Key Establishment Protocol for Wireless Sensor and Actor Networks". Journal of Sensors 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/5071617.
Texto completoHu, Xiang Dong y Peng Qin Yu. "Detection of False Data Injection Attack in the Internet of Things". Advanced Materials Research 452-453 (enero de 2012): 932–36. http://dx.doi.org/10.4028/www.scientific.net/amr.452-453.932.
Texto completo