低速率移动自组织网络安全路由协议

马涛, 陈娟, 王勇 - 火力与指挥控制, 2014 - cqvip.com
由于移动Ad Hoc 网络具有无需基础设施, 可以快速部署, 很难完全被摧毁等优点,
被作为数字化战场通信的优先选择, 设计实现了一种适用于低速率移动Ad Hoc …

Two-Factor Authentication Using Mobile OTP and Multi-dimensional Infinite Hash Chains

UK Roy, D Mahansaria - … and Communication: Proceedings of the 2020 …, 2020 - Springer
Hash chains are often used to implement One Time Password based authentication
systems. Some use finite hash chains that require frequent system re-initialization. Some …

Using the discrete squaring function in the delayed message authentication protocol

B Groza, TL Dragomir, D Petrica - International Conference on …, 2006 - ieeexplore.ieee.org
The delayed message authentication protocol (DeMA protocol) is a protocol that can be
used in order to exchange authentic information between two entities by using a one-way …

Integrated architectural modeling and analysis for high-assurance command and control system design

Y Deng, J Wang - Annals of Software Engineering, 1999 - Springer
Abstract A Real-Time Architectural Specification (RAS) approach and its application to
command and control (C2) systems are presented. Our objective is to establish a formal …

Methods and apparatus for efficient computation of one-way chains in cryptographic applications

BM Jakobsson - US Patent 10,083,308, 2018 - Google Patents
Techniques are disclosed for efficient computation of consecutive values of one-way chains
and other one-way graphs in cryptographic applications. The one-way chain or graph may …

Secure Authentication Using One Time Contextual QR Code

D Mahansaria, UK Roy - … Symposium on Security in Computing and …, 2019 - Springer
Traditional methods of authentication are subject to a wide variety of attacks. There is a high
demand to deploy necessary mechanisms while authenticating a user to safeguard him/her …

Methods and apparatus for efficient computation of one-way chains in cryptographic applications

BM Jakobsson - US Patent 8,990,576, 2015 - Google Patents
Techniques are disclosed for efficient computation of consecutive values of one-way chains
and other one-way graphs in cryptographic applications. The one-way chain or graph may …

网络化制造认证系统的研究和实现

张红, 肖迪 - 计算机工程与应用, 2004 - cqvip.com
网络化制造认证系统的研究和实现-[维普官方网站]-www.cqvip.com-维普网  我的维普 购物车
充值 客服 首页 | 期刊大全 | 文献分类 | 优先出版 | 论文检测 | 论文选题 | 在线分享 | 学者空间 | 学术 …

[PDF][PDF] On the efficiency of authentication protocols, digital signatures and their applications in e-health: a top-down approach

K Bıçakcı - 2003 - etd.lib.metu.edu.tr
ON THE EFFICIENCY OF AUTHENTICATION PROTOCOLS, DIGITAL SIGNATURES AND
THEIR APPLICATIONS IN E-HEALTH: A TOP-DOWN APPROACH A THES Page 1 ON THE …

[PDF][PDF] Exploration of bubble properties in cryptocurrencies: a hybrid-study with quantitative models for crash estimation supplemented with industry experts

ER Hollekim, J Raa - 2018 - openaccess.nhh.no
We employ Supremum Augmented Dickey-Fuller (SADF), the General Supremum
Augmented Dickey-Fuller (GSADF) tests and a Log Periodic Power Law (LPPL) test to …