نتایج جستجو برای: authentication data structure

تعداد نتایج: 3694940  

2003
Roberto Tamassia

Authenticated data structures are a model of computation where untrusted responders answer queries on a data structure on behalf of a trusted source and provide a proof of the validity of the answer to the user. We present a survey of techniques for designing authenticated data structures and overview their computational efficiency. We also discuss implementation issues and practical applications.

Journal: :IJSN 2009
Sven Laur Sylvain Pasini

All classical authentication protocols are based on pre-shared authentic information such as long-term secret keys or a public key infrastructure. However, there are many practical settings, where participants can additionally employ authentic OutOf-Band (OOB) communication, e.g., manual message transfer. In this paper, we study the corresponding user-aided message authentication and key agreem...

2001
Mohan S. Kankanhalli Ee-Chien Chang Xin Guan Zhiyong Huang Yinghui Wu

3D volume data is being increasingly used in many applications. The digital nature of the data allows easy creation, copying and distribution. However, it also allows ease of manipulation which can enable wilful or inadvertent misrepresentation of the content. For an application like medical imaging, this can have serious diagnostic and legal implications. Thus there is a strong need to establi...

Journal: :JNW 2014
Guowei Wang Guangming Xu Manjun Xue

To solve the problems of unified identity authentication between heterogeneous application systems that emerged in the procedure of informatization construction. The paper presents a 3-tier architecture solution that contains user tier, unified authentication tier and application system tier to realize unified identity authentication between legacy system and new application system. For legacy ...

Journal: :International Journal of Computer Science and Information Technology 2014

Journal: :JNW 2013
Pinghui Zou

Data aggregation technology can effectively save network energy resource and storage resource so it is extensively applied in wireless sensor network. However, data aggregation technology also brings security problems and it demands that corresponding security schemes should be taken for precaution. Based on the requirement of the data aggregation security on WSN, combined with the features of ...

Journal: :Journal of Physics: Conference Series 2021

Journal: :Electronics 2022

To tackle the problems of questioning authenticity products faced in e-commerce live streaming and low data integrity process product transactions, concept traceability a authentication scheme that integrates blockchain technology are proposed. The proposed deploys strategy on Ethereum form smart contract calls method body by executing to realize quality. A combination on-chain off-chain is use...

Journal: :Automatica 2022

Network-based attacks on control systems may alter sensor data delivered to the controller, effectively causing degradation in performance. As a result, having access accurate state estimates, even presence of measurements, is critical importance. In this work, we analyze performance resilient estimators (RSEs) when any subset sensors be compromised by stealthy attacker . Specifically, consider...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید