搜索结果: 1-6 共查到“数学 security”相关记录6条 . 查询时间(0.14 秒)
The Preimage Security of Double-Block-Length Compression Functions
Hash Function Preimage Resistance Block Cipher Beyond Birthday Bound Foundations
2012/12/4
We present new techniques for deriving preimage resistance bounds for block cipher based double-block-length, double-call hash functions. We give improved bounds on the preimage security of the three ...
SNEED: Enhancing Network Security Services Using Network Coding and Joint Capacity
Network Security Services Network Coding Joint Capacity
2011/3/3
The Throughput Cost of Information-Theoretic Security in Decentralized Wireless Networks
Throughput Cost of Information-Theoretic Security Decentralized Wireless Networks
2011/2/24
This paper studies the throughput of large-scale decentralized wireless networks with informationtheoretic security constraints.
A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator
A Cyber Security Study SCADA Energy Management System
2010/11/15
The electrical power network is a critical infrastructure in today's society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example,...
Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI
Robust Beamforming for Security MIMO Wiretap Channels
2010/12/3
In this paper, we investigate methods for reducing the likelihood that a message transmitted between two multiantenna nodes is intercepted by an undetected eavesdropper.
Goldreich (ECCC 2000) suggested a simple construction of a candidate one-way function f : {0, 1}n → {0, 1}m where each bit of output is a fixed predicate P of a constant number d of (random) inpu bits...