KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION AND A FORMAL VERIFICATION OF ITS SECURITY.

被引:0
|
作者
Kasami, Tadao
Yamamura, Saburo
Mori, Kenichi
机构
来源
Systems, computers, controls | 1982年 / 13卷 / 03期
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
4
引用
收藏
页码:59 / 69
相关论文
共 50 条
  • [41] Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security
    Al-Shaer, Ehab
    Marrero, Will
    El-Atawy, Adel
    ElBadawi, Khalid
    2009 17TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2009), 2009, : 123 - +
  • [42] Implementing end-to-end encryption strategist for strengthening data security across network communication
    Balpande, Vijaya Parag
    Aher, Ujjwala Bal
    Borkar, Pradnya
    Bhanarkar, Parul
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 465 - 476
  • [43] Public-Key Encryption Secure Against Related Randomness Attacks for Improved End-to-End Security of Cloud/Edge Computing
    Liu, Pengtao
    IEEE ACCESS, 2020, 8 : 16750 - 16759
  • [44] End-to-End Verification for Subgraph Solving
    Gocht, Stephan
    McCreesh, Ciaran
    Myreen, Magnus O.
    Nordstrom, Jakob
    Oertel, Andy
    Tan, Yong Kiam
    THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 8, 2024, : 8038 - 8047
  • [45] End-to-end Verification of QoS Policies
    El-Atawy, Adel
    Samak, Taghrid
    2012 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2012, : 426 - 434
  • [46] Security of End-to-End medical images encryption system using trained deep learning encryption and decryption network
    Inam, Saba
    Kanwal, Shamsa
    Anwar, Anousha
    Mirza, Noor Fatima
    Alfraihi, Hessa
    EGYPTIAN INFORMATICS JOURNAL, 2024, 28
  • [47] Subverting Telegram's End-to-End Encryption
    Cogliati, Benoit
    Ethan, Jordan
    Jha, Ashwin
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (01) : 5 - 40
  • [48] System of end-to-end symmetric database encryption
    Galushka, V. V.
    Aydinyan, A. R.
    Tsvetkova, O. L.
    Fathi, V. A.
    Fathi, D. V.
    INTERNATIONAL CONFERENCE INFORMATION TECHNOLOGIES IN BUSINESS AND INDUSTRY 2018, PTS 1-4, 2018, 1015
  • [49] On Track of Sigfox Confidentiality with End-to-End Encryption
    Fujdiak, Radek
    Blazek, Petr
    Mikhaylov, Konstantin
    Malina, Lukas
    Mlynek, Petr
    Misurec, Jiri
    Blazek, Vojtech
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [50] The Application of Public Communication Network Security Management Based on End-to-End Image Encryption Algorithm of LU Chaotic System
    Wang, Yao
    International Journal of Network Security, 2024, 26 (06) : 1071 - 1081