Literatura académica sobre el tema "Message adversary"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Message adversary".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Message adversary"
TONIEN, DONGVU, REIHANEH SAFAVI-NAINI y PETER WILD. "ON "THE POWER OF VERIFICATION QUERIES" IN UNCONDITIONALLY SECURE MESSAGE AUTHENTICATION". Discrete Mathematics, Algorithms and Applications 03, n.º 03 (septiembre de 2011): 287–303. http://dx.doi.org/10.1142/s1793830911001218.
Texto completoHaroutunian, Mariam, Parandzem Hakobyan y Arman Avetisyan. "Two-Stage Optimal Hypotheses Testing for a Model of Stegosystem with an Active Adversary". JUCS - Journal of Universal Computer Science 29, n.º 11 (28 de noviembre de 2023): 1254–73. http://dx.doi.org/10.3897/jucs.112913.
Texto completoAkhmetzyanova, Liliya R. y Alexandra A. Babueva. "On the unforgeability of the Chaum - Pedersen blind signature scheme". Prikladnaya Diskretnaya Matematika, n.º 65 (2024): 41–65. http://dx.doi.org/10.17223/20710410/65/3.
Texto completoGuo, Li y Gang Yao. "Protocols for Message Authentication from a Weak Secret". Applied Mechanics and Materials 380-384 (agosto de 2013): 2892–96. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2892.
Texto completoRyabko, Boris. "Unconditionally Secure Ciphers with a Short Key for a Source with Unknown Statistics". Entropy 25, n.º 10 (30 de septiembre de 2023): 1406. http://dx.doi.org/10.3390/e25101406.
Texto completoPatra, Arpita, Ashish Choudhary, C. Pandu Rangan, Kannan Srinathan y Prasad Raghavendra. "Perfectly reliable and secure message transmission tolerating mobile adversary". International Journal of Applied Cryptography 1, n.º 3 (2009): 200. http://dx.doi.org/10.1504/ijact.2009.023467.
Texto completoHu, Zhi Wen, Xian Ming Wang, Tao Tao Lv, Shan Shan Zhao y Rui Jun Jing. "Random Linear Network Coding with Probabilistic Polynomial-Time Wiretap Adversary". Applied Mechanics and Materials 556-562 (mayo de 2014): 6354–57. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6354.
Texto completoZhong, Sheng. "An Efficient and Secure Cryptosystem for Encrypting Long Messages". Fundamenta Informaticae 71, n.º 4 (enero de 2006): 493–97. https://doi.org/10.3233/fun-2006-71407.
Texto completoBishara, Azmi. "The Quest for Strategy". Journal of Palestine Studies 32, n.º 2 (1 de enero de 2003): 41–49. http://dx.doi.org/10.1525/jps.2003.32.2.41.
Texto completoPriya R., Sathiya y V. Gokulakrishnan. "Effectively Secure Data Retrieving for Using Three Different Level Security". International Journal of Advance Research and Innovation 3, n.º 2 (2015): 49–53. http://dx.doi.org/10.51976/ijari.321512.
Texto completoTesis sobre el tema "Message adversary"
Yang, Q. "Secure message transmission in the general adversary model". Thesis, University College London (University of London), 2011. http://discovery.ucl.ac.uk/1334691/.
Texto completoAlbouy, Timothé. "Foundations of reliable cooperation under asynchrony, Byzantine faults, and message adversaries". Electronic Thesis or Diss., Université de Rennes (2023-....), 2024. http://www.theses.fr/2024URENS062.
Texto completoThis thesis explores fault-tolerant distributed systems. It focuses more specifically on implementing reliable broadcast in asynchronous environments prone to hybrid failures. We introduce a novel computing model combining Byzantine process failures with a message adversary. We then define the Message-Adversary-tolerant Byzantine Reliable Broadcast (MBRB) abstraction and prove its optimal resilience condition. We present three key algorithms implementing this abstraction: a simple signature-based MBRB algorithm, a new primitive called k2l-cast for cryptography-free MBRB implementations, and an erasure-coding-based MBRB algorithm optimizing communication complexity. These contributions advance the understanding of fault-tolerant distributed systems and provide a foundation for designing resilient and efficient distributed algorithms, with applications in critical infrastructures, financial systems, and blockchain technologies
Libros sobre el tema "Message adversary"
Perkins, James C. Midnight Religion: Messages of Victory in the Midst of Adversity. Sims Media Group, 2016.
Buscar texto completoOssei-Owusu, Shaun. Barack Obama’s Anomalous Relationship with the Hip-Hop Community. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252036453.003.0014.
Texto completoWellman, Trisha, Christine Merriman, Ann Aubin Gibson, Kari Aum y Christa Swart. My Mess Is My Message: Inspiring Stories of Incredible Women Who Found Purpose and Prosperity Through Adversity. Independently Published, 2022.
Buscar texto completoYoung People, You Are under Attack!: A Message to Bring Out the Leader in Today's Youth, Despite Adversity. Independently Published, 2022.
Buscar texto completoGibbs, Robert. Young People, You Are under Attack!: A Message to Bring Out the Leader in Today's Youth, Despite Adversity. Independently Published, 2022.
Buscar texto completoWilson, Lindsay. Job. Wm. B. Eerdmans Publishing Co., 2015. http://dx.doi.org/10.5040/bci-008j.
Texto completoCapítulos de libros sobre el tema "Message adversary"
Serjantov, Andrei y Steven J. Murdoch. "Message Splitting Against the Partial Adversary". En Privacy Enhancing Technologies, 26–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11767831_3.
Texto completoSchmid, Ulrich, Manfred Schwarz y Kyrill Winkler. "On the Strongest Message Adversary for Consensus in Directed Dynamic Networks". En Structural Information and Communication Complexity, 102–20. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01325-7_13.
Texto completoChoudhury, Ashish, Kaoru Kurosawa y Arpita Patra. "Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary". En Applied Cryptography and Network Security, 292–308. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21554-4_17.
Texto completoSafavi-Naini, Reihaneh y Mohammed Ashraful Alam Tuhin. "Bounds and Constructions for 1-Round (0,δ)-Secure Message Transmission against Generalized Adversary". En Progress in Cryptology - AFRICACRYPT 2012, 82–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31410-0_6.
Texto completoHunter, Aaron. "Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversary". En Intelligence and Security Informatics, 61–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89900-6_9.
Texto completoOmolewa, Michael, Emmanuel Orihentare Eregare y Rose Eyefujinrin Ebohon. "Africa’s Response to Intangible Cultural Heritage Convention". En Heritage Studies, 113–24. Cham: Springer Nature Switzerland, 2024. https://doi.org/10.1007/978-3-031-72123-6_7.
Texto completoHess, Daniel Baldwin y Alex Bitterman. "Who Are the People in Your Gayborhood? Understanding Population Change and Cultural Shifts in LGBTQ+ Neighborhoods". En The Life and Afterlife of Gay Neighborhoods, 3–39. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-66073-4_1.
Texto completoBalasubramanian, Kannan. "Securing Public Key Encryption Against Adaptive Chosen Ciphertext Attacks". En Algorithmic Strategies for Solving Complex Problems in Cryptography, 134–44. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2915-6.ch011.
Texto completoLebovic, James H. "Commitment". En The False Promise of Superiority, 93—C4P103. Oxford University PressNew York, 2023. http://dx.doi.org/10.1093/oso/9780197680865.003.0004.
Texto completoWatkins, Calvert. "Preliminaries". En How to Kill a Dragon, 297–303. Oxford University PressNew York, NY, 1995. http://dx.doi.org/10.1093/oso/9780195085952.003.0027.
Texto completoActas de conferencias sobre el tema "Message adversary"
Srinathan, Kannan, Arpita Patra, Ashish Choudhary y C. Pandu Rangan. "Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary". En the 4th International Symposium. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1533057.1533083.
Texto completoBlacksttone, Jeremy y Wayne Patterson. "Isolating Key Phrases to Identify Ransomware Attackers". En 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002200.
Texto completoPatafta, Dominik y Ines Milohnić. "CHALLENGES OF MANAGERIAL COMMUNICATION IN HOTEL BUSINESS OPERATIONS". En Tourism and hospitality industry. University of Rijeka, Faculty of Tourism and Hospitality Management, 2023. http://dx.doi.org/10.20867/thi.26.21.
Texto completoGurbuz, Mustafa. "PERFORMING MORAL OPPOSITION: MUSINGS ON THE STRATEGY AND IDENTITY IN THE GÜLEN MOVEMENT". En Muslim World in Transition: Contributions of the Gülen Movement. Leeds Metropolitan University Press, 2007. http://dx.doi.org/10.55207/hzit2119.
Texto completo