Cryptographic Protocols
Mostrando 1-8 de 8 artigos, teses e dissertações.
-
1. Verificação formal de protocolos criptográficos : o caso dos protocolos em cascata
Ensuring the security of cryptographic protocols is not a simple task. The Dolev-Yao model, proposed in the early 80s, is an important mathematical modeling method of cryptographic protocols, enabling the analysis and verification of the safety of these protocols. But the analytical verification does not guarantee that implementations are not error-prone. In
Publicado em: 2008
-
2. Criptografia quântica em redes de informação crítica - aplicação a telecomunicações aeronáuticas. / Quantum cryptography in critical information networks - application to aeronautical telecommunications.
The importance of security maintenance in critical information networks has been rising in recent times. Over the past decades, the utilization of cryptography tools, mainly those based on computationally intractable problems, was enough to ensure the security of communications systems. The development of the new information processing technique known as qua
Publicado em: 2008
-
3. DHA :um esquema de acordo de chaves baseado em matrizes para o protocolo Diffie-Hellman
In this work is proposed an annonimous cryptographic key agreement protocol by secure way based on Diffe-Hellman protocol. Actually key agreement protocols like Diffe-Hellman, ElGamal and other work with modular exponentiation operations and the complexity of such protocols are based on apparent diffcult to deal DLP (Discrete Logarithm Problems). The propose
Publicado em: 2007
-
4. REDES VIRTUAIS PRIVADAS / PRIVATE VIRTUAL NETWORK.
Along with the computers networks emerges the possibility of managing remotely the intelligent organizations although the safe change of information has become a problem to the institutions which transport structured data through nets of computers. One of the largest challenges is the search for safe and economically viable solutions. Protocols of safety, cr
Publicado em: 2005
-
5. ESQUEMAS DE MODULAÇÃO PARA DISTRIBUIÇÃO QUÂNTICA DE CHAVES COM CODIFICAÇÃO DE FREQÜÊNCIA / MODULATION SCHEMES FOR FREQUENCY CODED QUANTUM KEY DISTRIBUTION
Quantum cryptography has been proposed as a solution to the cryptographic key distribution problem with absolute security guaranteed by the principles of quantum mechanics. Through this scheme it is possible to find out whether a spy tried to eavesdrop on the transmission, which was impossible to discover using classical transmission techniques. In this work
Publicado em: 2005
-
6. Protocolos para computaÃÃo segura entre dois participantes para Ãlgebra linear e estatÃstica
A aplicaÃÃo mais recorrente da Criptografia à a sua utilizaÃÃo quando duas partes desejam trocar informaÃÃes secretas de forma privada, porÃm com o surgimento das grandes redes de computadores, outras formas e tÃcnicas surgiram, entre elas o aparecimento da ComputaÃÃo Segura entre MÃltiplos Participantes (MPC). A MPC consiste de duas ou mais part
Publicado em: 2005
-
7. Segurança na arquitetura TCP/IP : de firewalls a canais seguros
The range of TCP/IP protocols and applications is probably as wide as is strong the need for security mechanisms in this architecture. The scope of the security aspects goes from the inherent security of operating systems, through firewalls, cryptography and secure channels, up to specific applications. As a general rule, little literature deals thoroughly w
Publicado em: 1999
-
8. A cryptologic based trust center for medical images.
OBJECTIVE: To investigate practical solutions that can integrate cryptographic techniques and picture archiving and communication systems (PACS) to improve the security of medical images. DESIGN: The PACS at the University of California San Francisco Medical Center consolidate images and associated data from various scanners into a centralized data archive a