نتایج جستجو برای: ccm
تعداد نتایج: 2119 فیلتر نتایج به سال:
We analyze the security of the CTR + CBC-MAC (CCM) encryption mode. This mode, proposed by Doug Whiting, Russ Housley, and Niels Ferguson, combines the CTR (“counter”) encryption mode with CBC-MAC message authentication and is based on a block cipher such as AES. We present concrete lower bounds for the security of CCM in terms of the security of the underlying block cipher. The conclusion is t...
Applications of wireless communications networks are emerging continuously. To offer a good level of security in these applications, new standards for wireless communications propose solutions based on cryptographic algorithms working on special modes of operation. This work presents a custom hardware architecture for the AES-CCM Protocol (AES-CCMP) which is the basis for the security architect...
Finding and addressing off-nominal behaviors in the later phases of the software development life cycle is costly and time consuming. In our previous work, we proposed the causal component model (CCM), a semi-automated approach that can expose off-nominal behaviors in requirements. The empirical study with CCM showed promising results, but CCM has limitations with scalability. To reduce the sca...
A review is given of our recent application of a systematic microscopic formulation of quantum many-body theory, namely the coupled-cluster method (CCM), to Hamiltonian U (1) lattice gauge models in the pure gauge sector. It is emphasized that our CCM results represent a natural extension or resummation of the results from the strong-coupling perturbation theory.
In order to unravel the role of regulation on transcript level in central carbohydrate metabolism (CCM) of Thermoproteus tenax, a focused DNA microarray was constructed by using 85 open reading frames involved in CCM. A transcriptional analysis comparing heterotrophic growth on glucose versus autotrophic growth on CO2-H2 was performed.
The authors present the case for collaborative cohort supervision (CCM), including both master's students and novice supervisors, as a possible way to rapidly increase the number of supervisors needed to address the recent implementation of a compulsory research component to specialist registration with the Health Professions Council of South Africa. Different models of CCM are discussed and po...
This memo describes the use of the Advanced Encryption Standard (AES) in the Counter with Cipher Block Chaining Message Authentication Code (CBC-MAC) Mode (CCM) of operation within Transport Layer Security (TLS) and Datagram TLS (DTLS) to provide confidentiality and data origin authentication. The AES-CCM algorithm is amenable to compact implementations, making it suitable for constrained envir...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید