AL IMEM ALI
ali_limem2006 at hotmail.com
Thu Mar 13 21:47:20 PDT 2014
if we are talking about signature privacy , which tools are used to check content integrity ?
Sent from my ASUS MeMO Pad
Alex Afanasyev <alexander.afanasyev at ucla.edu> wrote:
It all depends on what is your plan. What I meant is that in the simulator you always know who is the good guy and who is the attacker. All "corrupted" or incorrectly signed Datas can simply be represented by an "evil bit" and the verification process can be a matter of checking the evil bit.
On Mar 13, 2014, at 9:35 PM, AL IMEM ALI <ali_limem2006 at hotmail.com> wrote:
> you said many security-related things can be simulated without implementig actual signature algorithms could you give me an idea ?
> Sent from my ASUS MeMO Pad
> Alex Afanasyev <alexander.afanasyev at ucla.edu> wrote:
> Hi Al,
> Would you mind explaining what you're trying to achieve by implementing such algorithms inside the simulator? Many security-related things can be simulated in NS-3/ndnSIM without implementing actual signature algorithms.
> On Mar 13, 2014, at 1:34 AM, AL IMEM ALI <ali_limem2006 at hotmail.com> wrote:
>> HI ALEX
>> my strategy is to implement new signature algorithms like RSA , DSA .... in the signature field related to NDN packet could you help me please , or give me an idea to implement such a method.
>> Best Wishes
>> AL IMEM ALI
>> ndnSIM mailing list
>> ndnSIM at lists.cs.ucla.edu
> ndnSIM mailing list
> ndnSIM at lists.cs.ucla.edu
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the ndnSIM