Achieving Higher-Fidelity Conjunction Analyses Using Cryptography to Improve Information Sharing
This report examines the feasibility of using modern cryptographic tools to improve space situational awareness. Specifically, the authors examine the applicability of secure multiparty computation (MPC) protocols as a means to compute the collision probability of two satellites. MPC protocols would...
Bewaard in:
Hoofdauteur: | |
---|---|
Andere auteurs: | , |
Formaat: | Elektronisch Hoofdstuk |
Taal: | Engels |
Gepubliceerd in: |
RAND Corporation
2014
|
Onderwerpen: | |
Online toegang: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Voeg label toe
Geen labels, Wees de eerste die dit record labelt!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_115287 | ||
005 | 20231005 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20231005s2014 xx |||||o ||| 0|eng d | ||
020 | |a j.ctt5vjx8q | ||
020 | |a 9780833085214 | ||
020 | |a 9780833081667 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.7249/j.ctt5vjx8q |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a UD |2 bicssc | |
072 | 7 | |a TRP |2 bicssc | |
072 | 7 | |a TTM |2 bicssc | |
100 | 1 | |a Hemenway, Brett |4 auth | |
700 | 1 | |a Welser, William IV |4 auth | |
700 | 1 | |a Baiocchi, Dave |4 auth | |
245 | 1 | 0 | |a Achieving Higher-Fidelity Conjunction Analyses Using Cryptography to Improve Information Sharing |
260 | |b RAND Corporation |c 2014 | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a This report examines the feasibility of using modern cryptographic tools to improve space situational awareness. Specifically, the authors examine the applicability of secure multiparty computation (MPC) protocols as a means to compute the collision probability of two satellites. MPC protocols would provide satellite operators with a way to compute such "conjunction analyses" while maintaining the privacy of each operator's orbital information. | ||
540 | |a All rights reserved |4 http://oapen.org/content/about-rights | ||
546 | |a English | ||
650 | 7 | |a Digital lifestyle |2 bicssc | |
650 | 7 | |a Aerospace & aviation technology |2 bicssc | |
650 | 7 | |a Military engineering |2 bicssc | |
653 | |a Technology | ||
856 | 4 | 0 | |a www.oapen.org |u https://www.jstor.org/stable/10.7249/j.ctt5vjx8q |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/115287 |7 0 |z DOAB: description of the publication |