نتایج جستجو برای: government protocol

تعداد نتایج: 377577  

2014
Neil Butcher Angela Stewart Saad Biaz

Unmanned aircraft systems are gaining popularity in commercial and government applications. This, however, makes these systems susceptible to security attacks. This paper overviews some of the security considerations in unmanned aircraft systems and details an encryption protocol implementation. Because encryption can be very expensive in computational resources and battery consumption, an effi...

Journal: :IACR Cryptology ePrint Archive 2015
Kristian Gjøsteen Anders Smedstuen Lund

The Norwegian government ran trials of internet remote voting during the 2011 municipal elections and the 2013 parliamentary elections. From a simplified version of the voting protocol used there, the essential cryptographic operations of the voting protocol has been put together into a cryptosystem in which one can build the voting protocol on top of. This paper proposes a new instantiation of...

1993
Philipp Hoschka

A distributed application that uses a standard protocol for communication very often applies only a subset of the protocol options provided by the standard. However, it is difficult today for an application developer to tailor standard protocol options to the specific needs of an application, because no appropriate profiling method (formalized profile description and protocol configuration tool...

2000
Adrian Perrig Dawn Xiaodong Song

In this paper, we describe our new results in developing and extending Automatic Protocol Generation (APG), an approach to automatically generate security protocols. We explore two-party mutual authentication and key agreement protocols, with a trusted third party (TTP) which shares a symmetric key with each of the two principals. During the process, we experienced the challenge of a gigantic p...

1997
Babak Falsafi David A. Wood

Distributed-memory parallel computers and networks of workstations (NOWs) both rely on efficient communication over increasingly high-speed networks. Software communication protocols are often the performance bottleneck. Several current and proposed parallel systems address this problem by dedicating one general-purpose processor in a symmetric mul-tiprocessor (SMP) node specifically for protoc...

2014
Dania Aljeaid Xiaoqi Ma Caroline Langensiepen

Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tends to be the main element that government agencies look for. Thu...

2011
Hayam K. Al-Anie Mohammad A. Alia Adnan A. Hnaif

In this paper we propose a new secure E-Voting protocol based on public-key encryption cryptosystem. This protocol is summarized in three processes: firstly, access control process which involves the identification and authentication phases for the applied citizens. Secondly, the voting process which will be done by ciphering the voter information using public-key encryption cryptosystem (RSA),...

1994
Gerard A.W. Vreeswijk Alfred D.M. Wan

Protocols for intelligent agents are difficult to write. This is partially because intelligent agents accommodate their interaction to the situation that arises. As a result, the interaction among intelligent agents cannot be governed by a fixed protocol. In this paper we describe an open protocol paradigm for reasoning in a multi-agent system with decentralized control. An open protocol is a c...

2015
Theodore M. Wong Jeannette M. Wing

We present a new protocol to perform non-interactive verifiable secret redistribution (VSR) for secrets distributed with Shamir’s secret sharing scheme. We base our VSR protocol on Desmedt and Jajodia’s redistribution protocol for linear secret sharing schemes, which we specialize for Shamir’s scheme. We extend their redistribution protocol with Feldman’s non-interactive verifiable secret shari...

2001

This paper was prepared by Frank Flatters under the USAID/RCSA SADC Trade Protocol Project. The views and opinions expressed here are those of the author and should not be attributed in any way to USAID, the US Government, SADC and its institutions, or any other agency or individual. Comments and suggestions are most welcome and can be sent to [email protected] and

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید