搜索结果: 1-15 共查到“军队指挥学 key management”相关记录21条 . 查询时间(0.171 秒)
A Machine-Checked Proof of Security for AWS Key Management Service
Provable-Security Machine-Checked Proof Key Management
2019/9/19
We present a machine-checked proof of security for the domain management protocol of Amazon Web Services' KMS (Key Management Service) a critical security service used throughout AWS and by AWS custom...
Threshold Partially-Oblivious PRFs with Applications to Key Management
Oblivious PRF Key Management
2018/8/10
An Oblivious PRF (OPRF) is a protocol between a server holding a key to a PRF and a user holding an input. At the end of the interaction, the user learns the output of the OPRF on its input and nothin...
Distributed SSH Key Management with Proactive RSA Threshold Signatures
distributed cryptography implementation RSA secret sharing
2018/5/2
SSH is a security network protocol that uses public key cryptography for client authentication. SSH connections are designed to be run between a client and a server and therefore in enterprise network...
Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events
applied cryptography bitcoin key management
2016/1/6
In this paper we study the question of key management and
practical operational security in bitcoin digital currency storage systems.
We study the security two most used bitcoin HD Wallet key manage...
PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management
Physical Unclonable Function Key Management Forward Security
2015/12/21
PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management.
Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks
Cryptanalysis Cryptographic Authentication Network Security
2014/3/6
In 2012, Alagheband and Aref presented a dynamic and secure key manage ment model for hierarchical heterogeneous sensor networks. They proposed a signcryption algorithm which is the main building bloc...
We consider applications involving a number of servers in the cloud that go through a sequence of online periods where the servers communicate, separated by offline periods where the servers are idle....
An Efficient Scheme for Centralized Group Key Management in Collaborative Environments
Rekeying collaborative platforms
2014/3/11
The increasing demand for on-line collaborative applications has sparked the interest for multicast services, which in many cases have to guarantee properties such as authentication or confidentiality...
Type-Based Analysis of Generic Key Management APIs (Long Version)
Key-Management APIs Secure Hardware
2014/3/13
In the past few years, cryptographic key management APIs have been shown to be subject to tricky attacks based on the improper use of cryptographic keys. In fact, real APIs provide mechanisms to decla...
Attacks and Comments on Several Recently Proposed Key Management Schemes
key management schemes hierarchical access control collusion attack
2013/4/18
In this paper, we review three problematic key management(KM) schemes recently proposed, including Kayam’s scheme for groups with hierarchy [9], Piao’s group KM scheme [13], Purushothama’s group KM sc...
Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds
cryptographic protocols key management
2012/3/20
Cloud computing confers strong economic advantages, but many clients are reluctant to implicitly trust a third-party cloud provider. To address these security concerns, data may be transmitted and sto...
Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds
cryptographic protocols key management
2012/6/14
Cloud computing confers strong economic advantages, but many clients are reluctant to implicitly trust a third-party cloud provider. To address these security concerns, data may be transmitted and sto...
Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds
cryptographic protocols key management
2012/8/28
Cloud computing confers strong economic advantages, but many clients are reluctant to implicitly trust a third-party cloud provider. To address these security concerns, data may be transmitted and sto...
Secure Group Key Management Approach Based upon N-dimensional Hyper-sphere
Group communication key management hyper-sphere security
2012/3/28
Secure group communication systems become more and more important in many emerging network applications. For a secure group communication system, an efficient and robust group key management approach ...
A Simple and Efficient New Group Key Management Approach Based on Linear Geometry
Linear Geometry GC implementation
2012/3/28
A new fundamental and secure group key management approach with a group controller GC using the theory of polynomial functions over a vector space over finite field is developed, where each member in ...