نتایج جستجو برای: tamper resilient cryptography
تعداد نتایج: 54844 فیلتر نتایج به سال:
The ability to calculate hash values is fundamental for using cryptographic tools, such as digital signatures, with RDF data. Without hashing it is difficult to implement tamper-resistant attribution or provenance tracking, both important for establishing trust with open data. We propose a novel hash function for RDF graphs, which does not require altering the contents of the graph, does not ne...
This paper consists of two parts: First part deals with activities of TSRC. Second part is about TSRC comments on 140-3, which is primarily the same as the comments submitted to NIST last February, where we discussed that the forthcoming standards of cryptographic module should include the Side Channel Security Requirement (SCSR). Although SCSR may be described focusing on attack technique or c...
Agriculture is confronted with several significant difficulties, such as rising air temperatures and population growth, causing the implementation of smart farming operations an optimum solution. This research aims to contribute growing knowledge potential role blockchain technology in promoting concept by enhancing efficiency boosting agricultural production, lowering environmental impact, aut...
Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. Its goal can be either to improve the productivity or to strengthen the security. Specific identification protocols based on symmetric challengeresponse have been developed in order to assure the privacy of the device bearers. Although these protocols fit the d...
Traditionally, resistance has been cast as adversarial – the enemy of change that must be defeated if change is to be successful. While it is apparent that classical management theory viewed resistance in such a manner, recent literature contains much evidence that suggests resistance may indeed be useful and is not to be simply discounted. Present day suggestions and prescriptions for managing...
Mobile code suffers from the malicious host problem. When an adversary receives code he is able to effectively tamper with the code if he is able to relate the operations of the program with the appropriate context, that is, understanding the semantics of the program. In order to thwart an adversary from effectively tampering with a program he must be given an encrypted version such that he may...
To reduce the chance of being compromised, digital evidence must be preserved in a secure way when it is generated. The preservation must assure confidentiality, integrity, and survivability of the digital evidence. Some generic storage systems have been proposed. However, they cannot meet the critical requirements for digital evidence preservation. This paper introduces a secure distributed di...
Data confidentiality has become a major concern for individuals as well as for companies and administrations. In a classical client-server setting, the access control management is performed on the server, relying on the assumption that the server is a trusted party. However, this assumption no longer holds given the increasing vulnerability of database servers facing a growing number of extern...
Group signature schemes allow a group member to sign messages on behalf of the group. Such signatures must be anonymous and unlinkable but, whenever needed, a designated group manager can reveal the identity of the signer. During the last decade group signatures have been playing an important role in cryptographic research; many solutions have been proposed and some of them are quite efficient,...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید