نتایج جستجو برای: tamper resilient cryptography

تعداد نتایج: 54844  

2014
Edzard Höfig Ina Schieferdecker

The ability to calculate hash values is fundamental for using cryptographic tools, such as digital signatures, with RDF data. Without hashing it is difficult to implement tamper-resistant attribution or provenance tracking, both important for establishing trust with open data. We propose a novel hash function for RDF graphs, which does not require altering the contents of the graph, does not ne...

2005
Tsutomu Matsumoto Shinichi Kawamura Kouichi Fujisaki Naoya Torii Shuichi Ishida Yukiyasu Tsunoo Minoru Saeki Atsuhiro Yamagishi

This paper consists of two parts: First part deals with activities of TSRC. Second part is about TSRC comments on 140-3, which is primarily the same as the comments submitted to NIST last February, where we discussed that the forthcoming standards of cryptographic module should include the Side Channel Security Requirement (SCSR). Although SCSR may be described focusing on attack technique or c...

Journal: :Baghdad Science Journal 2008

Journal: :Wireless Communications and Mobile Computing 2022

Agriculture is confronted with several significant difficulties, such as rising air temperatures and population growth, causing the implementation of smart farming operations an optimum solution. This research aims to contribute growing knowledge potential role blockchain technology in promoting concept by enhancing efficiency boosting agricultural production, lowering environmental impact, aut...

2005
Gildas Avoine Etienne Dysli Philippe Oechslin

Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. Its goal can be either to improve the productivity or to strengthen the security. Specific identification protocols based on symmetric challengeresponse have been developed in order to assure the privacy of the device bearers. Although these protocols fit the d...

1998
Dianne Waddell

Traditionally, resistance has been cast as adversarial – the enemy of change that must be defeated if change is to be successful. While it is apparent that classical management theory viewed resistance in such a manner, recent literature contains much evidence that suggests resistance may indeed be useful and is not to be simply discounted. Present day suggestions and prescriptions for managing...

2004
Willard Thompson Alec Yasinsac J. Todd McDonald

Mobile code suffers from the malicious host problem. When an adversary receives code he is able to effectively tamper with the code if he is able to relate the operations of the program with the appropriate context, that is, understanding the semantics of the program. In order to thwart an adversary from effectively tampering with a program he must be given an encrypted version such that he may...

Journal: :J. Inf. Sci. Eng. 2014
Jia-Chun Lin Shiuh-Pyng Shieh Chia-Wei Hsu

To reduce the chance of being compromised, digital evidence must be preserved in a secure way when it is generated. The preservation must assure confidentiality, integrity, and survivability of the digital evidence. Some generic storage systems have been proposed. However, they cannot meet the critical requirements for digital evidence preservation. This paper introduces a secure distributed di...

Journal: :Annales des Télécommunications 2006
Nicolas Anciaux Luc Bouganim Philippe Pucheral

Data confidentiality has become a major concern for individuals as well as for companies and administrations. In a classical client-server setting, the access control management is performed on the server, relying on the assumption that the server is a trusted party. However, this assumption no longer holds given the increasing vulnerability of database servers facing a growing number of extern...

2002
Sébastien Canard Marc Girault

Group signature schemes allow a group member to sign messages on behalf of the group. Such signatures must be anonymous and unlinkable but, whenever needed, a designated group manager can reveal the identity of the signer. During the last decade group signatures have been playing an important role in cryptographic research; many solutions have been proposed and some of them are quite efficient,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید