Artigos de revistas sobre o tema "Adversaire de message"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Adversaire de message".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Saindon, Marcelle. "Le Buddha comme neuvième avatāra du dieu hindou Visnu". Studies in Religion/Sciences Religieuses 32, n.º 3 (setembro de 2003): 299–310. http://dx.doi.org/10.1177/000842980303200304.
Texto completo da fonteFrémeaux, Jacques. "Abd el-Kader, chef de guerre (1832-1847)". Revue Historique des Armées 250, n.º 1 (1 de janeiro de 2008): 100–107. http://dx.doi.org/10.3917/rha.250.0100.
Texto completo da fonteShi, Wenbo, Debiao He e Peng Gong. "On the Security of a Certificateless Proxy Signature Scheme with Message Recovery". Mathematical Problems in Engineering 2013 (2013): 1–4. http://dx.doi.org/10.1155/2013/761694.
Texto completo da fonteTONIEN, DONGVU, REIHANEH SAFAVI-NAINI e PETER WILD. "ON "THE POWER OF VERIFICATION QUERIES" IN UNCONDITIONALLY SECURE MESSAGE AUTHENTICATION". Discrete Mathematics, Algorithms and Applications 03, n.º 03 (setembro de 2011): 287–303. http://dx.doi.org/10.1142/s1793830911001218.
Texto completo da fonteNoh, Geontae, Ji Young Chun e Ik Rae Jeong. "Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model". Journal of Applied Mathematics 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/371924.
Texto completo da fonteMartin, Jeremy, Douglas Alpuche, Kristina Bodeman, Lamont Brown, Ellis Fenske, Lucas Foppe, Travis Mayberry, Erik Rye, Brandon Sipes e Sam Teplov. "Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol". Proceedings on Privacy Enhancing Technologies 2019, n.º 4 (1 de outubro de 2019): 34–53. http://dx.doi.org/10.2478/popets-2019-0057.
Texto completo da fonteGodard, Emmanuel, e Eloi Perdereau. "Back to the Coordinated Attack Problem". Mathematical Structures in Computer Science 30, n.º 10 (novembro de 2020): 1089–113. http://dx.doi.org/10.1017/s0960129521000037.
Texto completo da fonteHosseini Beghaeiraveri, Seyed Amir, Mohammad Izadi e Mohsen Rezvani. "Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing". Security and Communication Networks 2020 (1 de agosto de 2020): 1–10. http://dx.doi.org/10.1155/2020/9428457.
Texto completo da fonteCheng, Zishuai, Mihai Ordean, Flavio Garcia, Baojiang Cui e Dominik Rys. "Watching your call: Breaking VoLTE Privacy in LTE/5G Networks". Proceedings on Privacy Enhancing Technologies 2023, n.º 2 (abril de 2023): 282–97. http://dx.doi.org/10.56553/popets-2023-0053.
Texto completo da fonteZhong, Sheng. "An Efficient and Secure Cryptosystem for Encrypting Long Messages". Fundamenta Informaticae 71, n.º 4 (janeiro de 2006): 493–97. https://doi.org/10.3233/fun-2006-71407.
Texto completo da fontePriya R., Sathiya, e V. Gokulakrishnan. "Effectively Secure Data Retrieving for Using Three Different Level Security". International Journal of Advance Research and Innovation 3, n.º 2 (2015): 49–53. http://dx.doi.org/10.51976/ijari.321512.
Texto completo da fonteGuo, Li, e Gang Yao. "Protocols for Message Authentication from a Weak Secret". Applied Mechanics and Materials 380-384 (agosto de 2013): 2892–96. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2892.
Texto completo da fonteRyabko, Boris. "Unconditionally Secure Ciphers with a Short Key for a Source with Unknown Statistics". Entropy 25, n.º 10 (30 de setembro de 2023): 1406. http://dx.doi.org/10.3390/e25101406.
Texto completo da fonteHuang, Chin-Tser, Mohamed G. Gouda e E. N. Elnozahy. "Convergence of IPsec in presence of resets". Journal of High Speed Networks 15, n.º 2 (janeiro de 2006): 173–83. https://doi.org/10.3233/hsn-2006-285.
Texto completo da fonteTONIEN, DONGVU, REIHANEH SAFAVI-NAINI e PETER NICKOLAS. "BREAKING AND REPAIRING AN APPROXIMATE MESSAGE AUTHENTICATION SCHEME". Discrete Mathematics, Algorithms and Applications 03, n.º 03 (setembro de 2011): 393–412. http://dx.doi.org/10.1142/s1793830911001292.
Texto completo da fonteOmolara, Abiodun Esther, e Aman Jantan. "Modified honey encryption scheme for encoding natural language message". International Journal of Electrical and Computer Engineering (IJECE) 9, n.º 3 (1 de junho de 2019): 1871. http://dx.doi.org/10.11591/ijece.v9i3.pp1871-1878.
Texto completo da fonteNoh, Jaewon, Sangil Jeon e Sunghyun Cho. "Distributed Blockchain-Based Message Authentication Scheme for Connected Vehicles". Electronics 9, n.º 1 (1 de janeiro de 2020): 74. http://dx.doi.org/10.3390/electronics9010074.
Texto completo da fonteGhaleb, Fuad A., Waleed Ali, Bander Ali Saleh Al-Rimy e Sharaf J. Malebary. "Intelligent Proof-of-Trustworthiness-Based Secure Safety Message Dissemination Scheme for Vehicular Ad Hoc Networks Using Blockchain and Deep Learning Techniques". Mathematics 11, n.º 7 (2 de abril de 2023): 1704. http://dx.doi.org/10.3390/math11071704.
Texto completo da fonteAndrighetto, Luca, Samer Halabi e Arie Nadler. "Fostering trust and forgiveness through the acknowledgment of others’ past victimization". Journal of Social and Political Psychology 5, n.º 2 (1 de fevereiro de 2018): 651–64. http://dx.doi.org/10.5964/jspp.v5i2.728.
Texto completo da fonteAlhassan, Salamudeen, Mohammed Ibrahim Daabo e Gabriel Kofi Armah. "Twin K-Shuffle Based Audio Steganography". Asian Journal of Engineering and Applied Technology 11, n.º 1 (1 de junho de 2022): 1–4. http://dx.doi.org/10.51983/ajeat-2022.11.1.3200.
Texto completo da fonteHu, Zhi Wen, Xian Ming Wang, Tao Tao Lv, Shan Shan Zhao e Rui Jun Jing. "Random Linear Network Coding with Probabilistic Polynomial-Time Wiretap Adversary". Applied Mechanics and Materials 556-562 (maio de 2014): 6354–57. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6354.
Texto completo da fonteGu, Chen, Arshad Jhumka e Carsten Maple. "Silence is Golden: A Source Location Privacy Scheme for Wireless Sensor Networks Based on Silent Nodes". Security and Communication Networks 2022 (18 de novembro de 2022): 1–16. http://dx.doi.org/10.1155/2022/5026549.
Texto completo da fonteCahyadi, Eko Fajar, e Min-Shiang Hwang. "An improved efficient anonymous authentication with conditional privacy-preserving scheme for VANETs". PLOS ONE 16, n.º 9 (10 de setembro de 2021): e0257044. http://dx.doi.org/10.1371/journal.pone.0257044.
Texto completo da fonteTirado-García, Alejandra. "The Negative Campaign on Telegram: The Political Use of Criticism during the 2021 Community of Madrid Elections". Social Sciences 12, n.º 2 (11 de fevereiro de 2023): 93. http://dx.doi.org/10.3390/socsci12020093.
Texto completo da fonteLauer, Sebastian, Kai Gellert, Robert Merget, Tobias Handirk e Jörg Schwenk. "T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction". Proceedings on Privacy Enhancing Technologies 2020, n.º 2 (1 de abril de 2020): 336–57. http://dx.doi.org/10.2478/popets-2020-0030.
Texto completo da fonteHaroutunian, Mariam, Parandzem Hakobyan e Arman Avetisyan. "Two-Stage Optimal Hypotheses Testing for a Model of Stegosystem with an Active Adversary". JUCS - Journal of Universal Computer Science 29, n.º 11 (28 de novembro de 2023): 1254–73. http://dx.doi.org/10.3897/jucs.112913.
Texto completo da fonteFranzoni, Federico, e Vanesa Daza. "Clover: An anonymous transaction relay protocol for the bitcoin P2P network". Peer-to-Peer Networking and Applications 15, n.º 1 (6 de outubro de 2021): 290–303. http://dx.doi.org/10.1007/s12083-021-01241-z.
Texto completo da fonteAkhmetzyanova, Liliya R., e Alexandra A. Babueva. "On the unforgeability of the Chaum - Pedersen blind signature scheme". Prikladnaya Diskretnaya Matematika, n.º 65 (2024): 41–65. http://dx.doi.org/10.17223/20710410/65/3.
Texto completo da fonteDebnath, Ashmita, Pradheepkumar Singaravelu e Shekhar Verma. "Efficient spatial privacy preserving scheme for sensor network". Open Engineering 3, n.º 1 (1 de janeiro de 2013): 1–10. http://dx.doi.org/10.2478/s13531-012-0048-7.
Texto completo da fonteHuang, Zhenjie, Runlong Duan, Qunshan Chen, Hui Huang e Yuping Zhou. "Secure Outsourced Attribute-Based Signatures with Perfect Anonymity in the Standard Model". Security and Communication Networks 2021 (16 de outubro de 2021): 1–14. http://dx.doi.org/10.1155/2021/7884007.
Texto completo da fonteLin, Banks, Wayne Henry e Richard Dill. "Defending Small Satellites from Malicious Cybersecurity Threats". International Conference on Cyber Warfare and Security 17, n.º 1 (2 de março de 2022): 479–88. http://dx.doi.org/10.34190/iccws.17.1.60.
Texto completo da fonteLiu, Heyang. "Designing And Implementing a Chat System with Enhanced Security Via AES Encryption Methods". Highlights in Science, Engineering and Technology 85 (13 de março de 2024): 480–86. http://dx.doi.org/10.54097/wkfk9p24.
Texto completo da fonteKumar, Boddupalli Anvesh, e V. Bapuji. "Efficient privacy preserving communication protocol for IOT applications". Brazilian Journal of Development 10, n.º 1 (5 de janeiro de 2024): 402–19. http://dx.doi.org/10.34117/bjdv10n1-025.
Texto completo da fontePatra, Arpita, Ashish Choudhary, C. Pandu Rangan, Kannan Srinathan e Prasad Raghavendra. "Perfectly reliable and secure message transmission tolerating mobile adversary". International Journal of Applied Cryptography 1, n.º 3 (2009): 200. http://dx.doi.org/10.1504/ijact.2009.023467.
Texto completo da fonteSantoli, Thomas, e Christian Schaffner. "Using Simon's algorithm to attack symmetric-key cryptographic primitives". Quantum Information and Computation 17, n.º 1&2 (janeiro de 2017): 65–78. http://dx.doi.org/10.26421/qic17.1-2-4.
Texto completo da fonteBishara, Azmi. "The Quest for Strategy". Journal of Palestine Studies 32, n.º 2 (1 de janeiro de 2003): 41–49. http://dx.doi.org/10.1525/jps.2003.32.2.41.
Texto completo da fonteAlawatugoda, Janaka. "Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions". Cryptography 7, n.º 1 (5 de janeiro de 2023): 1. http://dx.doi.org/10.3390/cryptography7010001.
Texto completo da fonteKurosawa, Kaoru. "Round-efficient perfectly secure message transmission scheme against general adversary". Designs, Codes and Cryptography 63, n.º 2 (17 de julho de 2011): 199–207. http://dx.doi.org/10.1007/s10623-011-9546-5.
Texto completo da fonteGonzález Muñiz, Madeline, e Rainer Steinwndt. "Security of signature schemes in the presence of key-dependent messages". Tatra Mountains Mathematical Publications 47, n.º 1 (1 de dezembro de 2010): 15–29. http://dx.doi.org/10.2478/v10127-010-0029-2.
Texto completo da fonteLiu, Muhua, e Ping Zhang. "An Adaptively Secure Functional Encryption for Randomized Functions". Computer Journal 63, n.º 8 (agosto de 2020): 1247–58. http://dx.doi.org/10.1093/comjnl/bxz154.
Texto completo da fonteCoulouma, Étienne, Emmanuel Godard e Joseph Peters. "A characterization of oblivious message adversaries for which Consensus is solvable". Theoretical Computer Science 584 (junho de 2015): 80–90. http://dx.doi.org/10.1016/j.tcs.2015.01.024.
Texto completo da fonteCAI, XIAO-QIU, e QING-QING LIU. "ROBUST MESSAGE AUTHENTICATION OVER A COLLECTIVE-NOISE CHANNEL". International Journal of Quantum Information 10, n.º 06 (setembro de 2012): 1250064. http://dx.doi.org/10.1142/s0219749912500645.
Texto completo da fonteSafavi-Naini, Reihaneh, Alireza Poostindouz e Viliam Lisy. "Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication". Security and Communication Networks 2018 (7 de maio de 2018): 1–15. http://dx.doi.org/10.1155/2018/8475818.
Texto completo da fonteFügger, Matthias, Thomas Nowak e Manfred Schwarz. "Tight Bounds for Asymptotic and Approximate Consensus". Journal of the ACM 68, n.º 6 (31 de dezembro de 2021): 1–35. http://dx.doi.org/10.1145/3485242.
Texto completo da fonteBoddu, Naresh Goud, e Upendra Kapshikar. "Tamper Detection against Unitary Operators". Quantum 7 (8 de novembro de 2023): 1178. http://dx.doi.org/10.22331/q-2023-11-08-1178.
Texto completo da fonteLazzaro, Sara, e Francesco Buccafurri. "Stealthy Messaging: Leveraging Message Queuing Telemetry Transport for Covert Communication Channels". Applied Sciences 14, n.º 19 (2 de outubro de 2024): 8874. http://dx.doi.org/10.3390/app14198874.
Texto completo da fonteDe Santis, Alfredo, Anna Lisa Ferrara, Manuela Flores e Barbara Masucci. "Continuous Entity Authentication in the Internet of Things Scenario". Applied Sciences 13, n.º 10 (11 de maio de 2023): 5945. http://dx.doi.org/10.3390/app13105945.
Texto completo da fonteUllah, Ikram, Munam Ali Shah, Abid Khan, Carsten Maple e Abdul Waheed. "Virtual Pseudonym-Changing and Dynamic Grouping Policy for Privacy Preservation in VANETs". Sensors 21, n.º 9 (28 de abril de 2021): 3077. http://dx.doi.org/10.3390/s21093077.
Texto completo da fonteGhafoor, AtaUllah, Muhammad Sher, Muhammad Imran e Imran Baig. "Disjoint Key Establishment Protocol for Wireless Sensor and Actor Networks". Journal of Sensors 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/5071617.
Texto completo da fonteHu, Xiang Dong, e Peng Qin Yu. "Detection of False Data Injection Attack in the Internet of Things". Advanced Materials Research 452-453 (janeiro de 2012): 932–36. http://dx.doi.org/10.4028/www.scientific.net/amr.452-453.932.
Texto completo da fonte