搜索结果: 1-7 共查到“军事学 Real-time”相关记录7条 . 查询时间(0.089 秒)
A Conditional Privacy Preserving Authentication and Multi Party Group Key Establishment Scheme for Real-Time Application in VANETs
Password Authentication VANET Group-Key generation
2019/9/19
Vehicular Ad-hoc Networks (VANETs) are a cardinal part of intelligent transportation system (ITS) which render various services in terms of traffic and transport management. The VANET is used to manag...
Towards real-time hidden speaker recognition by means of fully homomorphic encryption
Fully Homomorphic Encryption Neural Networks LWE
2019/8/30
Securing Neural Network (NN) computations through the use of Fully Homomorphic Encryption (FHE) is the subject of a growing interest in both communities. Among different possible approaches to that to...
Flexible Signatures: Towards Making Authentication Suitable for Real-Time Environments
Partial Verification Unpredictable Resource constraints Trade-off
2018/4/17
This work introduces the concept of flexible signatures. In a flexible signature scheme, the verification algorithm quantifies the validity of a signature based on the number of computations performed...
Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware
cryptocurrency fairness consensus
2017/11/29
We propose Tesseract, a secure real-time cryptocurrency exchange service. Centralized exchange designs are vulnerable to theft of funds, while decentralized exchanges cannot offer real-time cross-chai...
A Real-time Inversion Attack on the GMR-2 Cipher Used in the Satellite Phones
Satellite Phone Stream Cipher GMR-2
2017/7/6
The GMR-2 cipher is a kind of stream cipher currently being used in Inmarsat satellite phones. It has been proven that such cipher can be cracked using only one frame known keystream but with a modera...
Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography
Real-time cryptography Integrity-Aware Parallelizable
2015/12/23
Conventional Cipher Feedback Mode (CFB) can allow the transmission unit to be shorter than
the block-cipher length. Eventually, it causes no delay and even any message expansion unlike
the ECB and C...
Real time detection of cache-based side-channel attacks using Hardware Performance Counters
hardware performance counters cache side-channel
2015/12/22
In this paper we analyze three methods to detect
cache-based side-channel attacks in real time, preventing or
limiting the amount of leaked information. Two of the three
methods are based on machin...