Information security protocol based system identification with binary-valued observations
From MaRDI portal
Publication:1621182
DOI10.1007/s11424-017-7075-7zbMath1443.94083OpenAlexW2644864076MaRDI QIDQ1621182
Ji-Feng Zhang, Yanlong Zhao, Changbao Xu
Publication date: 8 November 2018
Published in: Journal of Systems Science and Complexity (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11424-017-7075-7
cryptographytime complexityinformation securitypassive attackssecurity protocolidentification algorithm
Related Items (1)
Cites Work
- Optimal military spending, trade and stochastic economic growth
- A multi-channel transmission schedule for remote state estimation under DoS attacks
- Player simulation and general adversary structures in perfect multiparty computation
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Fully homomorphic encryption using ideal lattices
- Distributed Consensus With Limited Communication Data Rate
This page was built for publication: Information security protocol based system identification with binary-valued observations