搜索结果: 1-15 共查到“军事学 Trust”相关记录29条 . 查询时间(0.074 秒)
Computing across Trust Boundaries using Distributed Homomorphic Cryptography
distributed homomorphic cryptosystems threshold cryptography secure multiparty computation
2019/8/26
In this work, we advance the conceptual and technical aspects of Secure Multiparty Computation (SMC). We approach SMC as a computational problem and propose a novel formulation of this problem in term...
ProtectIOn: Root-of-Trust for IO in Compromised Platforms
Compromised Platforms control systems
2019/7/31
Security and safety-critical remote applications such as e-voting, online banking, industrial control systems, medical devices, and home automation systems rely upon user interaction that is typically...
IoT systems are vulnerable to various cyber attacks as they form a subset of the In- ternet. Insider attacks find more significance since many devices are configured to access the Internet without int...
Minimizing Trust in Hardware Wallets with Two Factor Signatures
digital signatures threshold cryptography
2019/1/9
We introduce the notion of two-factor signatures (2FS), a generalization of a two-out-of-two threshold signature scheme in which one of the parties is a hardware token which can store a high-entropy s...
Authentication with weaker trust assumptions for voting systems
voting systems cryptographic protocols
2018/3/5
Some voting systems are reliant on external authentication services. Others use cryptography to implement their own. We combine digital signatures and non-interactive proofs to derive a generic constr...
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems
trust management social secret sharing applied cryptography
2017/8/1
In distributed storage systems, documents are shared among multiple Cloud providers and stored within their respective storage servers. In social secret sharing-based distributed storage systems, shar...
Trust models are widely used in various computer science disciplines. The main purpose of a trust model is to continuously measure trustworthiness of a set of entities based on their behaviors. In thi...
Centralized reputation systems use stars and reviews and thus require algorithm secrecy to avoid manipulation. In autonomous open source decentralized systems this luxury is not available. We create a...
Write-Optimized Consistency Verification in Cloud Storage with Minimal Trust
Merkle tree hash functions authentication codes
2016/12/7
We propose log-structured ADSs for lightweight verification in cloud outsourcing. Our approach is leveraging recently available commercial TEE (trusted execution environment, such as Intel SGX). For s...
A Novel Methodology for Testing Hardware Security and Trust Exploiting On-Chip Power Noise Measurements (Extended Version)
security trust standardised side-channel measurement
2016/5/30
Testing of electronic components is indispensable to minimize malfunction
and failure of complex electronic systems. Currently, functionality and performance of
these electronic components are the m...
Efficient quantum-resistant trust Infrastructure based on HIMMO
Post-Quantum Cryptography HIMMO TLS
2016/4/26
Secure Internet communications face conflicting demands: advances in (quantum) computers require stronger, quantum-resistant algorithms, while at the same time the Internet of Things demands better-pe...
Server Notaries: A Complementary Approach to the Web PKI Trust Model
Web PKI SSL/TLS man-in-the-middle attack
2016/2/23
. SSL/TLS is the de facto protocol for providing secure communication
over the Internet. It relies on the Web PKI model for authentication
and secure key exchange. Despite its relatively successful ...
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation
data aggregation privacy time-series data
2016/1/23
With the advent of networking applications collecting user data on a massive scale, the privacy of individual users appears to be a major concern. The main challenge is the design of a solution that...
Providing Root of Trust for ARM TrustZone using On-Chip SRAM
TrustZone Trusted Execution Environment TPM Service
2016/1/9
We present the design, implementation and evaluation of the root of trust for the Trusted Execution Environment (TEE) provided by ARM TrustZone based on SRAM Physical Unclonable Functions (PUFs). We f...
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems
Trust Management USB Storage Device Industrial Control System
2016/1/5
The security of sensitive data and the safety of control signal
are two core issues in industrial control system (ICS). However, the prevalence
of USB storage devices brings a great challenge on pro...