[PDF][PDF] Emerging and disruptive technologies, nuclear risk, and strategic stability

F Su, J Yuan - … Network. Testo disponibile al sito …, 2022 - europeanleadershipnetwork.org
… and military regulations, reshape the military system and lead to … quantum communication,
quantum cryptography, and other … a potential security threat, which will bring security pressure. …

[引用][C] Architecture and key technologies of cyberspace security

JZ Luo, M Yang, Z Ling, WJ Wu, XD Gu - SCIENTIA SINICA Information, 2016

[HTML][HTML] 基於區塊鏈和智能合約的車網交通事件確認與信賴驗證

YT Yang - 2019 - ir.lib.ncu.edu.tw
security issue on how to guarantee the correctness of traffic … The public key infrastructure
of VANETs ensures securesystem can mitigate these internal attacks, but the security of …

[PDF][PDF] 2006 年ACM 資訊, 電腦與通訊安全國際會議

謝續平 - 2005 - ir.lib.nycu.edu.tw
cryptography,Digital Right Management,Data integrity and audit,Mobile code and mobile agent
security,Database security,Network security… , computer networks,network standard 等,其下…

[PDF][PDF] 车联网隐私保护技术研究

李瑞琴, 胡晓雅, 张倨源, 王励成 - Journal of Cyber Security 信息安全 …, 2024 - jcs.iie.ac.cn
requirements, attack models, and privacy metrics of the Internet of Vehicles privacy protection
are analyzed … 出了一种CMIX 协议来创建加密混合区(Cryptography mix-zone, CMIX), 使车…

TrustChain: 具有可信执行环境的隐私保护智能合约模型⋆

F Wu, A Ye, Y Diao, Y Zhang, J Chen… - Available at SSRN … - papers.ssrn.com
… fine-grained confidentiality specifications in smart contract … order and is guaranteed by
cryptography to be untampered and … a comprehensive analysis on the malicious attack threats

[PDF][PDF] 阁EasyChair Preprint

H Zaki - 2024 - easychair.org
its role in World War II cryptography, symbolizes the challenge of decoding complex systems.
… for the greater good while minimizing potential risks and unintended consequences [5], [6]. …

降低node-compromised 攻擊法衝擊性

李雅婷, 葉義雄 - 2006 - ir.lib.nycu.edu.tw
… wireless security threats such as secret … Cryptography to design the signature and verification
mechanisms. Although this method achieves high security, the Elliptic Curve Cryptography

[HTML][HTML] 適用於多種設備的可否認鑑別協定之設計

Y Chuang - 2012 - ir.lib.ncu.edu.tw
opportunities. Hence, in this dissertation, we propose … ; the second is based on elliptic curve
cryptography (ECC), which is … to provide high security and reliability requirements of user’s …

在無線隨意網路中使用完美雜湊族的高效率秘密更新協定設計

許鴻祥, 葉義雄 - 2005 - ir.lib.nycu.edu.tw
… , a security mechanism should satisfy following requirements: … These requirements can
be supported by cryptography … Another type is the traffic analysis threat, which is much more …