Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 41-44 of 44 total results
Applied Cryptography and Network Security - DocShare.tips
authentication: password and smart card. To minimize the ping-pong effect, the session key is cached in the current network domain. Whenever the MC requests a handoff into a neighboring MR which has a valid shared session key with the MC, a user-authenticated key agreement protocol with secret key cryptography is performed. Thus an expensive full
Science of Security (SoS) Newsletter (2014 - Issue 6)
Dimitriou, T., "Secure and Scalable Aggregation in the Smart Grid," New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on, pp.1, 5, March 30 2014-April 2 2014 doi: 10.1109/NTMS.2014.6814048 In this work, we describe two decentralized protocols that can be used to securely aggregate the electricity measurements ...
Wireless Security and Cryptography: Specifications and ...
Currently, the only known secure SSSC is to use a block cipher in a 1-bit CFB mode (see [4]). This method is inefficient since it requires a block cipher call per bit of encryption. There have been other direct proposals of SSSC. Unfortunately, all such proposals have turned out to be insecure.
US 6850252 B1 - Intelligent Electronic Appliance System ...
By using this information, an affine transformation for transforming the original video image at time n to the original video image at time n+1 is obtained. Based on the infinitesimal transformation (A), {e At , and e A(t−1) } obtained by making the affine transformation continuous with regard to time is executed on the original video image ......
1 2 3 4 5
Pages
|