نتایج جستجو برای: government protocol
تعداد نتایج: 377577 فیلتر نتایج به سال:
Unmanned aircraft systems are gaining popularity in commercial and government applications. This, however, makes these systems susceptible to security attacks. This paper overviews some of the security considerations in unmanned aircraft systems and details an encryption protocol implementation. Because encryption can be very expensive in computational resources and battery consumption, an effi...
The Norwegian government ran trials of internet remote voting during the 2011 municipal elections and the 2013 parliamentary elections. From a simplified version of the voting protocol used there, the essential cryptographic operations of the voting protocol has been put together into a cryptosystem in which one can build the voting protocol on top of. This paper proposes a new instantiation of...
A distributed application that uses a standard protocol for communication very often applies only a subset of the protocol options provided by the standard. However, it is difficult today for an application developer to tailor standard protocol options to the specific needs of an application, because no appropriate profiling method (formalized profile description and protocol configuration tool...
In this paper, we describe our new results in developing and extending Automatic Protocol Generation (APG), an approach to automatically generate security protocols. We explore two-party mutual authentication and key agreement protocols, with a trusted third party (TTP) which shares a symmetric key with each of the two principals. During the process, we experienced the challenge of a gigantic p...
Distributed-memory parallel computers and networks of workstations (NOWs) both rely on efficient communication over increasingly high-speed networks. Software communication protocols are often the performance bottleneck. Several current and proposed parallel systems address this problem by dedicating one general-purpose processor in a symmetric mul-tiprocessor (SMP) node specifically for protoc...
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tends to be the main element that government agencies look for. Thu...
In this paper we propose a new secure E-Voting protocol based on public-key encryption cryptosystem. This protocol is summarized in three processes: firstly, access control process which involves the identification and authentication phases for the applied citizens. Secondly, the voting process which will be done by ciphering the voter information using public-key encryption cryptosystem (RSA),...
Protocols for intelligent agents are difficult to write. This is partially because intelligent agents accommodate their interaction to the situation that arises. As a result, the interaction among intelligent agents cannot be governed by a fixed protocol. In this paper we describe an open protocol paradigm for reasoning in a multi-agent system with decentralized control. An open protocol is a c...
We present a new protocol to perform non-interactive verifiable secret redistribution (VSR) for secrets distributed with Shamir’s secret sharing scheme. We base our VSR protocol on Desmedt and Jajodia’s redistribution protocol for linear secret sharing schemes, which we specialize for Shamir’s scheme. We extend their redistribution protocol with Feldman’s non-interactive verifiable secret shari...
This paper was prepared by Frank Flatters under the USAID/RCSA SADC Trade Protocol Project. The views and opinions expressed here are those of the author and should not be attributed in any way to USAID, the US Government, SADC and its institutions, or any other agency or individual. Comments and suggestions are most welcome and can be sent to [email protected] and
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید