搜索结果: 1-5 共查到“军事学 Analyses”相关记录5条 . 查询时间(0.109 秒)
concerto: A Methodology Towards Reproducible Analyses of TLS Datasets
SSL/TLS reproducible analysis
2017/2/20
Over the years, SSL/TLS has become an essential part of Internet security. As such, it should offer robust and state-of-the-art security, in particular for HTTPS, its first application. Theoretically,...
Crypto-analyses on “user efficient recoverable off-line e-cashs scheme with fast anonymity revoking”
anonymity unlikability cryptanalysis
2016/1/26
Recently, Fan et al. proposed a user efficient recoverable off-line e-cash scheme
with fast anonymity revoking. They claimed that their scheme could achieve security
requirements of an e-cash system...
On the Optimality of Differential Fault Analyses on CLEFIA
CLEFIA Differential Fault Analysis Fault Attack
2016/1/8
Differential Fault Analysis is a powerful cryptanalytic tool to reveal secret keys of cryptographic algorithms. By corrupting the computation of an algorithm, an attacker gets additional information a...
Crypto-analyses on “secure and efficient privacy-preserving public auditing scheme for cloud storage”
privacy-preserving auditing cloud storage bilinear pairing
2016/1/7
Recently, Worku et al. pointed out that the work “privacy-preserving public auditing for data storage security in cloud computing” proposed by Wang et al. is insecure and their second work “privacy- p...
How Secure and Quick is QUIC? Provable Security and Performance Analyses
Network security key exchange secure channels
2015/12/29
QUIC is a secure transport protocol developed by Google and implemented in Chrome in
2013, currently representing one of the most promising solutions to decreasing latency while
intending to provide...