Artículos de revistas sobre el tema "Message adversary"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Message adversary".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
TONIEN, DONGVU, REIHANEH SAFAVI-NAINI y PETER WILD. "ON "THE POWER OF VERIFICATION QUERIES" IN UNCONDITIONALLY SECURE MESSAGE AUTHENTICATION". Discrete Mathematics, Algorithms and Applications 03, n.º 03 (septiembre de 2011): 287–303. http://dx.doi.org/10.1142/s1793830911001218.
Texto completoHaroutunian, Mariam, Parandzem Hakobyan y Arman Avetisyan. "Two-Stage Optimal Hypotheses Testing for a Model of Stegosystem with an Active Adversary". JUCS - Journal of Universal Computer Science 29, n.º 11 (28 de noviembre de 2023): 1254–73. http://dx.doi.org/10.3897/jucs.112913.
Texto completoAkhmetzyanova, Liliya R. y Alexandra A. Babueva. "On the unforgeability of the Chaum - Pedersen blind signature scheme". Prikladnaya Diskretnaya Matematika, n.º 65 (2024): 41–65. http://dx.doi.org/10.17223/20710410/65/3.
Texto completoGuo, Li y Gang Yao. "Protocols for Message Authentication from a Weak Secret". Applied Mechanics and Materials 380-384 (agosto de 2013): 2892–96. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2892.
Texto completoRyabko, Boris. "Unconditionally Secure Ciphers with a Short Key for a Source with Unknown Statistics". Entropy 25, n.º 10 (30 de septiembre de 2023): 1406. http://dx.doi.org/10.3390/e25101406.
Texto completoPatra, Arpita, Ashish Choudhary, C. Pandu Rangan, Kannan Srinathan y Prasad Raghavendra. "Perfectly reliable and secure message transmission tolerating mobile adversary". International Journal of Applied Cryptography 1, n.º 3 (2009): 200. http://dx.doi.org/10.1504/ijact.2009.023467.
Texto completoHu, Zhi Wen, Xian Ming Wang, Tao Tao Lv, Shan Shan Zhao y Rui Jun Jing. "Random Linear Network Coding with Probabilistic Polynomial-Time Wiretap Adversary". Applied Mechanics and Materials 556-562 (mayo de 2014): 6354–57. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6354.
Texto completoZhong, Sheng. "An Efficient and Secure Cryptosystem for Encrypting Long Messages". Fundamenta Informaticae 71, n.º 4 (enero de 2006): 493–97. https://doi.org/10.3233/fun-2006-71407.
Texto completoBishara, Azmi. "The Quest for Strategy". Journal of Palestine Studies 32, n.º 2 (1 de enero de 2003): 41–49. http://dx.doi.org/10.1525/jps.2003.32.2.41.
Texto completoPriya R., Sathiya y V. Gokulakrishnan. "Effectively Secure Data Retrieving for Using Three Different Level Security". International Journal of Advance Research and Innovation 3, n.º 2 (2015): 49–53. http://dx.doi.org/10.51976/ijari.321512.
Texto completoTONIEN, DONGVU, REIHANEH SAFAVI-NAINI y PETER NICKOLAS. "BREAKING AND REPAIRING AN APPROXIMATE MESSAGE AUTHENTICATION SCHEME". Discrete Mathematics, Algorithms and Applications 03, n.º 03 (septiembre de 2011): 393–412. http://dx.doi.org/10.1142/s1793830911001292.
Texto completoKurosawa, Kaoru. "Round-efficient perfectly secure message transmission scheme against general adversary". Designs, Codes and Cryptography 63, n.º 2 (17 de julio de 2011): 199–207. http://dx.doi.org/10.1007/s10623-011-9546-5.
Texto completoLiu, Muhua y Ping Zhang. "An Adaptively Secure Functional Encryption for Randomized Functions". Computer Journal 63, n.º 8 (agosto de 2020): 1247–58. http://dx.doi.org/10.1093/comjnl/bxz154.
Texto completoCAI, XIAO-QIU y QING-QING LIU. "ROBUST MESSAGE AUTHENTICATION OVER A COLLECTIVE-NOISE CHANNEL". International Journal of Quantum Information 10, n.º 06 (septiembre de 2012): 1250064. http://dx.doi.org/10.1142/s0219749912500645.
Texto completoOmolara, Abiodun Esther y Aman Jantan. "Modified honey encryption scheme for encoding natural language message". International Journal of Electrical and Computer Engineering (IJECE) 9, n.º 3 (1 de junio de 2019): 1871. http://dx.doi.org/10.11591/ijece.v9i3.pp1871-1878.
Texto completoBoddu, Naresh Goud y Upendra Kapshikar. "Tamper Detection against Unitary Operators". Quantum 7 (8 de noviembre de 2023): 1178. http://dx.doi.org/10.22331/q-2023-11-08-1178.
Texto completoNoh, Geontae, Ji Young Chun y Ik Rae Jeong. "Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model". Journal of Applied Mathematics 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/371924.
Texto completoShi, Wenbo, Debiao He y Peng Gong. "On the Security of a Certificateless Proxy Signature Scheme with Message Recovery". Mathematical Problems in Engineering 2013 (2013): 1–4. http://dx.doi.org/10.1155/2013/761694.
Texto completoAndrighetto, Luca, Samer Halabi y Arie Nadler. "Fostering trust and forgiveness through the acknowledgment of others’ past victimization". Journal of Social and Political Psychology 5, n.º 2 (1 de febrero de 2018): 651–64. http://dx.doi.org/10.5964/jspp.v5i2.728.
Texto completoHuang, Chin-Tser, Mohamed G. Gouda y E. N. Elnozahy. "Convergence of IPsec in presence of resets". Journal of High Speed Networks 15, n.º 2 (enero de 2006): 173–83. https://doi.org/10.3233/hsn-2006-285.
Texto completoFranzoni, Federico y Vanesa Daza. "Clover: An anonymous transaction relay protocol for the bitcoin P2P network". Peer-to-Peer Networking and Applications 15, n.º 1 (6 de octubre de 2021): 290–303. http://dx.doi.org/10.1007/s12083-021-01241-z.
Texto completoGu, Chen, Arshad Jhumka y Carsten Maple. "Silence is Golden: A Source Location Privacy Scheme for Wireless Sensor Networks Based on Silent Nodes". Security and Communication Networks 2022 (18 de noviembre de 2022): 1–16. http://dx.doi.org/10.1155/2022/5026549.
Texto completoHosseini Beghaeiraveri, Seyed Amir, Mohammad Izadi y Mohsen Rezvani. "Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing". Security and Communication Networks 2020 (1 de agosto de 2020): 1–10. http://dx.doi.org/10.1155/2020/9428457.
Texto completoHuang, Zhenjie, Runlong Duan, Qunshan Chen, Hui Huang y Yuping Zhou. "Secure Outsourced Attribute-Based Signatures with Perfect Anonymity in the Standard Model". Security and Communication Networks 2021 (16 de octubre de 2021): 1–14. http://dx.doi.org/10.1155/2021/7884007.
Texto completoCahyadi, Eko Fajar y Min-Shiang Hwang. "An improved efficient anonymous authentication with conditional privacy-preserving scheme for VANETs". PLOS ONE 16, n.º 9 (10 de septiembre de 2021): e0257044. http://dx.doi.org/10.1371/journal.pone.0257044.
Texto completoKong, Fan Yu y Jia Yu. "Key Substitution Attack and Malleability of a Short Signature Scheme with Batch Verification". Applied Mechanics and Materials 55-57 (mayo de 2011): 1605–8. http://dx.doi.org/10.4028/www.scientific.net/amm.55-57.1605.
Texto completoLisova, Elena, Marina Gutiérrez, Wilfried Steiner, Elisabeth Uhlemann, Johan Åkerberg, Radu Dobrin y Mats Björkman. "Protecting Clock Synchronization: Adversary Detection through Network Monitoring". Journal of Electrical and Computer Engineering 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/6297476.
Texto completoKumar, Boddupalli Anvesh y V. Bapuji. "Efficient privacy preserving communication protocol for IOT applications". Brazilian Journal of Development 10, n.º 1 (5 de enero de 2024): 402–19. http://dx.doi.org/10.34117/bjdv10n1-025.
Texto completoFeng, Tao y Hong-Ru Bei. "Evaluation and Improvement of Internet Printing Protocol Based on HCPN Model Detection Method". Applied Sciences 13, n.º 6 (8 de marzo de 2023): 3467. http://dx.doi.org/10.3390/app13063467.
Texto completoSantoli, Thomas y Christian Schaffner. "Using Simon's algorithm to attack symmetric-key cryptographic primitives". Quantum Information and Computation 17, n.º 1&2 (enero de 2017): 65–78. http://dx.doi.org/10.26421/qic17.1-2-4.
Texto completoWang, Baocang y Yupu Hu. "Signature Scheme Using the Root Extraction Problem on Quaternions". Journal of Applied Mathematics 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/819182.
Texto completoLazzaro, Sara y Francesco Buccafurri. "Stealthy Messaging: Leveraging Message Queuing Telemetry Transport for Covert Communication Channels". Applied Sciences 14, n.º 19 (2 de octubre de 2024): 8874. http://dx.doi.org/10.3390/app14198874.
Texto completoSaifan, Ramzi y Omar Al-Jarrah. "A Novel Algorithm for Defending Path-Based Denial of Service Attacks in Sensor Networks". International Journal of Distributed Sensor Networks 6, n.º 1 (1 de enero de 2010): 793981. http://dx.doi.org/10.1155/2010/793981.
Texto completoKiryukhin, Vitaly A. y Andrey M. Sergeev. "“Sandwich”-like keyed algorithm based on the “Streebog” hash function". Prikladnaya Diskretnaya Matematika, n.º 63 (2024): 24–48. http://dx.doi.org/10.17223/20710410/63/2.
Texto completoUllah, Ikram, Munam Ali Shah, Abid Khan, Carsten Maple y Abdul Waheed. "Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs". Sensors 21, n.º 9 (28 de abril de 2021): 3077. http://dx.doi.org/10.3390/s21093077.
Texto completoCheng, Zishuai, Mihai Ordean, Flavio Garcia, Baojiang Cui y Dominik Rys. "Watching your call: Breaking VoLTE Privacy in LTE/5G Networks". Proceedings on Privacy Enhancing Technologies 2023, n.º 2 (abril de 2023): 282–97. http://dx.doi.org/10.56553/popets-2023-0053.
Texto completoMartin, Keith M., Maura B. Paterson y Douglas R. Stinson. "Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures". Cryptography and Communications 3, n.º 2 (15 de diciembre de 2010): 65–86. http://dx.doi.org/10.1007/s12095-010-0039-6.
Texto completoGonzález Muñiz, Madeline y Rainer Steinwndt. "Security of signature schemes in the presence of key-dependent messages". Tatra Mountains Mathematical Publications 47, n.º 1 (1 de diciembre de 2010): 15–29. http://dx.doi.org/10.2478/v10127-010-0029-2.
Texto completoChen, Dong, Wei Lu, Weiwei Xing y Na Wang. "An Untraceable Data Sharing Scheme in Wireless Sensor Networks". Sensors 19, n.º 1 (31 de diciembre de 2018): 114. http://dx.doi.org/10.3390/s19010114.
Texto completoKim, Jongkil, Yang-Wai Chow, Willy Susilo, Joonsang Baek y Intae Kim. "Functional Encryption for Pattern Matching with a Hidden String". Cryptography 6, n.º 1 (31 de diciembre de 2021): 1. http://dx.doi.org/10.3390/cryptography6010001.
Texto completoWang, Chen. "Some Thoughts on Strong Unforgeability in Ring Signature Schemes". Advanced Materials Research 457-458 (enero de 2012): 773–79. http://dx.doi.org/10.4028/www.scientific.net/amr.457-458.773.
Texto completoZhao, Nan Nan y Jian Bo Yao. "Mobile-Base-Station Location Privacy Based on Greedy Random Walk in WSN". Applied Mechanics and Materials 427-429 (septiembre de 2013): 2502–7. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2502.
Texto completoZhang, Jun. "Bidirectional Random Walk Based Mobile-Sink-LocationPrivacyin WSN". Applied Mechanics and Materials 529 (junio de 2014): 730–34. http://dx.doi.org/10.4028/www.scientific.net/amm.529.730.
Texto completoXia, Qi, Chun Xiang Xu y Yong Yu. "Key Replacement Attack on Two Certificateless Signature Schemes without Random Oracles". Key Engineering Materials 439-440 (junio de 2010): 1606–11. http://dx.doi.org/10.4028/www.scientific.net/kem.439-440.1606.
Texto completoYi, Chuanjun. "En-Route Message Authentication Scheme for Filtering False Data in WSNs". Security and Communication Networks 2021 (11 de septiembre de 2021): 1–18. http://dx.doi.org/10.1155/2021/4068507.
Texto completoMartin, Jeremy, Douglas Alpuche, Kristina Bodeman, Lamont Brown, Ellis Fenske, Lucas Foppe, Travis Mayberry, Erik Rye, Brandon Sipes y Sam Teplov. "Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol". Proceedings on Privacy Enhancing Technologies 2019, n.º 4 (1 de octubre de 2019): 34–53. http://dx.doi.org/10.2478/popets-2019-0057.
Texto completoZhao, Yong Fu y Jian Bo Yao. "Bidirection Greedy Walk Based Mobile-Base-Station-Location Privacy in Wireless Sensor Networks". Applied Mechanics and Materials 427-429 (septiembre de 2013): 2497–501. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2497.
Texto completoOpitz, Marcus, Vidhi Chaudhri y Yijing Wang. "Employee social-mediated crisis communication as opportunity or threat?" Corporate Communications: An International Journal 23, n.º 1 (5 de febrero de 2018): 66–83. http://dx.doi.org/10.1108/ccij-07-2017-0069.
Texto completoYang, Ling, Weiwei Yang, Liang Tang, Jia Tu, Xingbo Lu y Zhengyun He. "Beamforming Design and Covert Performance Analysis for Full-Duplex Multiantenna System". Complexity 2021 (7 de octubre de 2021): 1–10. http://dx.doi.org/10.1155/2021/8806874.
Texto completoFaust, Sebastian, Pratyay Mukherjee, Jesper Buus Nielsen y Daniele Venturi. "Continuously Non-malleable Codes in the Split-State Model". Journal of Cryptology 33, n.º 4 (24 de julio de 2020): 2034–77. http://dx.doi.org/10.1007/s00145-020-09362-z.
Texto completo