搜索结果: 1-5 共查到“军事学 SURVEILLANCE”相关记录5条 . 查询时间(0.12 秒)
AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems
Privacy Authentication Forward-secure signature
2018/12/19
As surveillance systems are popular, the privacy of the recorded video becomes more important. On the other hand, the authenticity of video images should be guaranteed when used as evidence in court. ...
Security of Symmetric Encryption against Mass Surveillance
Algorithm-substitution attacks big brother kleptography
2016/1/9
Motivated by revelations concerning population-wide surveillance of encrypted communications,
we formalize and investigate the resistance of symmetric encryption schemes to mass surveillance. The foc...
Security of Linear Secret-Sharing Schemes against Mass Surveillance
linear secret-sharing algorithm-substitution attack mass surveillance
2015/12/29
Following the line of work presented recently by Bellare, Paterson
and Rogaway, we formalize and investigate the resistance of linear
secret-sharing schemes to mass surveillance. This primitive is w...
A More Cautious Approach to Security Against Mass Surveillance
Mass surveillance algorithm-substitution attack symmetric encryption
2015/12/24
At CRYPTO 2014 Bellare, Paterson, and Rogaway (BPR) presented a formal treatment of
symmetric encryption in the light of algorithm-substitution attacks (ASAs), which may be employed
by ‘big brother’...
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks
algorithm substitution attacks kleptography symmetric encryption
2015/12/24
We present new algorithm-substitution attacks (ASAs) on symmetric encryption that improve over prior ones in two ways. First, while prior attacks only broke a sub-class of randomized schemes having a ...