Literatura científica selecionada sobre o tema "Adversaire de message"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Adversaire de message".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Adversaire de message"
Saindon, Marcelle. "Le Buddha comme neuvième avatāra du dieu hindou Visnu". Studies in Religion/Sciences Religieuses 32, n.º 3 (setembro de 2003): 299–310. http://dx.doi.org/10.1177/000842980303200304.
Texto completo da fonteFrémeaux, Jacques. "Abd el-Kader, chef de guerre (1832-1847)". Revue Historique des Armées 250, n.º 1 (1 de janeiro de 2008): 100–107. http://dx.doi.org/10.3917/rha.250.0100.
Texto completo da fonteShi, Wenbo, Debiao He e Peng Gong. "On the Security of a Certificateless Proxy Signature Scheme with Message Recovery". Mathematical Problems in Engineering 2013 (2013): 1–4. http://dx.doi.org/10.1155/2013/761694.
Texto completo da fonteTONIEN, DONGVU, REIHANEH SAFAVI-NAINI e PETER WILD. "ON "THE POWER OF VERIFICATION QUERIES" IN UNCONDITIONALLY SECURE MESSAGE AUTHENTICATION". Discrete Mathematics, Algorithms and Applications 03, n.º 03 (setembro de 2011): 287–303. http://dx.doi.org/10.1142/s1793830911001218.
Texto completo da fonteNoh, Geontae, Ji Young Chun e Ik Rae Jeong. "Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model". Journal of Applied Mathematics 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/371924.
Texto completo da fonteMartin, Jeremy, Douglas Alpuche, Kristina Bodeman, Lamont Brown, Ellis Fenske, Lucas Foppe, Travis Mayberry, Erik Rye, Brandon Sipes e Sam Teplov. "Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol". Proceedings on Privacy Enhancing Technologies 2019, n.º 4 (1 de outubro de 2019): 34–53. http://dx.doi.org/10.2478/popets-2019-0057.
Texto completo da fonteGodard, Emmanuel, e Eloi Perdereau. "Back to the Coordinated Attack Problem". Mathematical Structures in Computer Science 30, n.º 10 (novembro de 2020): 1089–113. http://dx.doi.org/10.1017/s0960129521000037.
Texto completo da fonteHosseini Beghaeiraveri, Seyed Amir, Mohammad Izadi e Mohsen Rezvani. "Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing". Security and Communication Networks 2020 (1 de agosto de 2020): 1–10. http://dx.doi.org/10.1155/2020/9428457.
Texto completo da fonteCheng, Zishuai, Mihai Ordean, Flavio Garcia, Baojiang Cui e Dominik Rys. "Watching your call: Breaking VoLTE Privacy in LTE/5G Networks". Proceedings on Privacy Enhancing Technologies 2023, n.º 2 (abril de 2023): 282–97. http://dx.doi.org/10.56553/popets-2023-0053.
Texto completo da fonteZhong, Sheng. "An Efficient and Secure Cryptosystem for Encrypting Long Messages". Fundamenta Informaticae 71, n.º 4 (janeiro de 2006): 493–97. https://doi.org/10.3233/fun-2006-71407.
Texto completo da fonteTeses / dissertações sobre o assunto "Adversaire de message"
Albouy, Timothé. "Foundations of reliable cooperation under asynchrony, Byzantine faults, and message adversaries". Electronic Thesis or Diss., Université de Rennes (2023-....), 2024. http://www.theses.fr/2024URENS062.
Texto completo da fonteThis thesis explores fault-tolerant distributed systems. It focuses more specifically on implementing reliable broadcast in asynchronous environments prone to hybrid failures. We introduce a novel computing model combining Byzantine process failures with a message adversary. We then define the Message-Adversary-tolerant Byzantine Reliable Broadcast (MBRB) abstraction and prove its optimal resilience condition. We present three key algorithms implementing this abstraction: a simple signature-based MBRB algorithm, a new primitive called k2l-cast for cryptography-free MBRB implementations, and an erasure-coding-based MBRB algorithm optimizing communication complexity. These contributions advance the understanding of fault-tolerant distributed systems and provide a foundation for designing resilient and efficient distributed algorithms, with applications in critical infrastructures, financial systems, and blockchain technologies
Perdereau, Eloi. "Accords exacts et approchés pour les adversaires de message". Electronic Thesis or Diss., Aix-Marseille, 2021. http://www.theses.fr/2021AIXM0611.
Texto completo da fonteOur subject is about computability of distributed systems in the messageadversaries family of models.For this purpose, several mathematical approaches are carried out.For instance, based on recent advances in the subject, we use well knowntopological methods to solve our problems.But we also used geometric, combinatorial and dynamical systems methods.In the first part, we are interested in the Consensus problem and the k-SetAgreement.They are what we called exact agreements, i.e. the decision values must beamong the proposed ones.As a complement to FG11, we have characterized topologically the solvability ofthe Binary Consensus problem with two process in the general model of messageadversaries.This new characterization gives a better intuition of the result.We also characterized the solvability of k-Set Agreement in omissionadversaries by giving the number of omission faults a system can tolerate inorder to solve the problem on an underlying communication graph.Doing so, we based our result on a topological method that we extended to ourgraphical models.Finally, we studied in a second part some approximate variations of the k-SetAgreement problem.In this approximate setting, the decision values are required to be close toone another, based on some precise conditions.Several variations were studied, most notably an asymptotic version thatdoesn't requires processes to explicitly terminatebut rather requires a certain type of convergence of the values.Theses results shows the diversity and intricacy of the questions that are atstake
Yang, Q. "Secure message transmission in the general adversary model". Thesis, University College London (University of London), 2011. http://discovery.ucl.ac.uk/1334691/.
Texto completo da fonteLivros sobre o assunto "Adversaire de message"
Thomas, Damion. Goodwill Ambassadors. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252038877.003.0007.
Texto completo da fonteForest, James J. F. Influence Warfare. Greenwood Publishing Group, Inc., 2009. http://dx.doi.org/10.5040/9798400670046.
Texto completo da fonteCapítulos de livros sobre o assunto "Adversaire de message"
Raynal, Michel. "Message Adversaries". In Encyclopedia of Algorithms, 1272–76. New York, NY: Springer New York, 2016. http://dx.doi.org/10.1007/978-1-4939-2864-4_609.
Texto completo da fonteRaynal, Michel. "Message Adversaries". In Encyclopedia of Algorithms, 1–6. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-642-27848-8_609-1.
Texto completo da fonteSerjantov, Andrei, e Steven J. Murdoch. "Message Splitting Against the Partial Adversary". In Privacy Enhancing Technologies, 26–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11767831_3.
Texto completo da fonteFujita, Maiki, Kenji Yasunaga e Takeshi Koshiba. "Perfectly Secure Message Transmission Against Rational Timid Adversaries". In Lecture Notes in Computer Science, 127–44. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01554-1_8.
Texto completo da fonteYasunaga, Kenji, e Takeshi Koshiba. "Perfectly Secure Message Transmission Against Independent Rational Adversaries". In Lecture Notes in Computer Science, 563–82. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32430-8_33.
Texto completo da fonteWinkler, Kyrill, Ulrich Schmid e Thomas Nowak. "Valency-Based Consensus Under Message Adversaries Without Limit-Closure". In Fundamentals of Computation Theory, 457–74. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-86593-1_32.
Texto completo da fonteMaffei, Ivo, e Andrew W. Roscoe. "Optimally-Fair Exchange of Secrets via Delay Encryption and Commutative Blinding". In Financial Cryptography and Data Security, 94–111. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-47754-6_6.
Texto completo da fonteSchmid, Ulrich, Manfred Schwarz e Kyrill Winkler. "On the Strongest Message Adversary for Consensus in Directed Dynamic Networks". In Structural Information and Communication Complexity, 102–20. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01325-7_13.
Texto completo da fonteChoudhury, Ashish, Kaoru Kurosawa e Arpita Patra. "Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary". In Applied Cryptography and Network Security, 292–308. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21554-4_17.
Texto completo da fonteSafavi-Naini, Reihaneh, e Mohammed Ashraful Alam Tuhin. "Bounds and Constructions for 1-Round (0,δ)-Secure Message Transmission against Generalized Adversary". In Progress in Cryptology - AFRICACRYPT 2012, 82–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31410-0_6.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Adversaire de message"
Schwarz, Manfred, Kyrill Winkler e Ulrich Schmid. "Fast consensus under eventually stabilizing message adversaries". In ICDCN '16: 17th International Conference on Distributed Computing and Networking. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2833312.2833323.
Texto completo da fonteBlacksttone, Jeremy, e Wayne Patterson. "Isolating Key Phrases to Identify Ransomware Attackers". In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002200.
Texto completo da fonteNowak, Thomas, Ulrich Schmid e Kyrill Winkler. "Topological Characterization of Consensus under General Message Adversaries". In PODC '19: ACM Symposium on Principles of Distributed Computing. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3293611.3331624.
Texto completo da fonteRaynal, Michel, e Julien Stainer. "Synchrony weakened by message adversaries vs asynchrony restricted by failure detectors". In the 2013 ACM symposium. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2484239.2484249.
Texto completo da fonteSrinathan, Kannan, Arpita Patra, Ashish Choudhary e C. Pandu Rangan. "Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary". In the 4th International Symposium. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1533057.1533083.
Texto completo da fonteDobó, Robert. "Military Conflicts and Country Image: The Country Image of Belligerents in Light of Ukraine, a Demographic, Communication Channel and Political Preference Based Perspective". In 29th International Scientific Conference Strategic Management and Decision Support Systems in Strategic Management. University of Novi Sad, Faculty of Economics in Subotica, 2024. http://dx.doi.org/10.46541/978-86-7233-428-9_404.
Texto completo da fonteHanley, Daniel, Jeff King e André dos Santos. "Defeating Malicious Terminals in an Electronic Voting System". In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2005. http://dx.doi.org/10.5753/sbseg.2005.21527.
Texto completo da fonteGurbuz, Mustafa. "PERFORMING MORAL OPPOSITION: MUSINGS ON THE STRATEGY AND IDENTITY IN THE GÜLEN MOVEMENT". In Muslim World in Transition: Contributions of the Gülen Movement. Leeds Metropolitan University Press, 2007. http://dx.doi.org/10.55207/hzit2119.
Texto completo da fonte