搜索结果: 1-15 共查到“军队指挥学 Routing”相关记录19条 . 查询时间(0.14 秒)
Privacy-Preserving Interdomain Routing at Internet Scale
BGP secure multi-party computation
2017/5/11
The Border Gateway Protocol (BGP) computes routes between the organizational networks that make up today's Internet. Unfortunately, BGP suffers from deficiencies, including slow convergence, security ...
Early Propagation and Imbalanced Routing, How to Diminish in FPGAs
dual-rail precharge logic WDDL FPGA
2016/1/9
This work deals with DPA-resistant logic styles, i.e., celllevel
countermeasures against power analysis attacks that are known as
a serious threat to cryptographic devices. Early propagation and imb...
Post-Quantum Forward-Secure Onion Routing (Future Anonymity in Today’s Budget)
Tor Onion routing Forward anonymity
2016/1/5
The onion routing (OR) network Tor provides anonymity to its users by routing their encrypted
traffic through three proxies (or nodes). The key cryptographic challenge, here, is to establish symmetri...
Provably Secure and Practical Onion Routing
cryptographic protocols / onion routing security proof universal composability one-way authenticated key exchange 1W-AKE
2012/3/28
The onion routing network Tor is undoubtedly the most widely employed technology for anony- mous web access. Although the underlying onion routing (OR) protocol appears satisfactory, a comprehensive a...
Provably Secure and Practical Onion Routing
cryptographic protocols onion routing security proof universal composability
2011/7/25
The onion routing network, Tor, is undoubtedly the most widely employed technology for anony- mous web access.
Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network
secret-key cryptography / Key Exchange MANET routing
2012/3/28
Mobile Ad-hoc Network (MANET) is a transitory and infrastructureless network supported by no fixed trusted infrastructure. To achieve security goals like: authentication, integrity, non-repudiation, p...
Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network
secret-key cryptography / Key Exchange MANET routing
2011/6/8
Mobile Ad-hoc Network (MANET) is a transitory and infrastructureless network supported by no fixed trusted infrastructure. To achieve security goals like: authentication, integrity, non-repudiation, p...
Framework for Security Proofs for On-demand Routing Protocols in Multi-Hop Wireless Networks
cryptographic protocols
2012/3/28
We present a framework for security proofs for on-demand routing protocols. The framework relies on the composable cryptographic library by Backes, Pfitzmann and Waidner (BPW). The idea is to break do...
Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA
Cryptographically Sound Security Proof On-Demand Source Routing Protocol EndairA
2011/3/11
We present the first cryptographically sound security proof of a routing
protocol for mobile ad-hoc networks. More precisely, we show that the route
discovery protocol does not output a non-existing...
Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA
cryptographic protocols
2012/3/29
We present the first cryptographically sound security proof of a routing protocol for mobile ad-hoc networks. More precisely, we show that the route discovery protocol does not output a non-existing p...
Using Sphinx to Improve Onion Routing Circuit Construction
Sphinx Onion Routing Circuit Construction
2009/12/29
This paper presents compact message formats for onion routing circuit construction using
the Sphinx methodology developed for mixes. We significantly compress the circuit construction
messages for t...
Low Latency High Bandwidth Anonymous Overlay Network with Anonymous Routing
Low Latency High Bandwidth Anonymous Overlay Network Anonymous Routing
2009/7/1
Most existing anonymous networks focus on providing strong anonymity for the price
of having lower bandwidth, higher latency and degraded usability when compared with the conventional
use of the Int...
The multi-path routing scheme provides reliable guarantee for mobile ad hoc network. A new method is
proposed that is using to analyze the security of multi-path routing protocol within the framework...
Authenticated Adversarial Routing.
Pairing-Based Onion Routing with Improved Forward Secrecy
onion routing Tor, pairing-based cryptography anonymous key agreement
2009/6/3
This paper presents new protocols for onion routing anonymity networks. We define a
provably secure privacy-preserving key agreement scheme in an identity-based infrastructure
setting, and use it to...