Results 231 to 240 of about 29,312 (265)
Hyperchaos and the fusion of Moore's automaton with gold sequences for augmented medical image encryption. [PDF]
Gabr M +5 more
europepmc +1 more source
A Lightweight Certificateless Authenticated Key Agreement Scheme Based on Chebyshev Polynomials for the Internet of Drones. [PDF]
Li Z, Ju Z, Zhao H, Wei Z, Lan G.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2011 National Conference on Communications (NCC), 2011
Traditionally message authentication codes (MACs) and the process of encryption are treated as orthogonal security mechanisms, where MACs are used to prove data authenticity while encryption is used to preserve confidentiality. In this paper we propose to integrate the two in a framework where the parameterized hash value of an encrypted image is ...
Sachin Kashyap, Kannan Karthik
openaire +1 more source
Traditionally message authentication codes (MACs) and the process of encryption are treated as orthogonal security mechanisms, where MACs are used to prove data authenticity while encryption is used to preserve confidentiality. In this paper we propose to integrate the two in a framework where the parameterized hash value of an encrypted image is ...
Sachin Kashyap, Kannan Karthik
openaire +1 more source
Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption
2004Since its introduction, broadcast encryption has attracted many useful applications. In this paper, we propose two identity-based schemes for authenticated broadcasting and distributed message authentication. The first scheme supports multiple broadcasters and allows each broadcaster to dynamically broadcast messages into an arbitrary group of ...
Yi Mu +3 more
openaire +1 more source
Authenticated encryption in SSH
Proceedings of the 9th ACM conference on Computer and communications security - CCS '02, 2002The Secure Shell (SSH) protocol is one of the most popular cryptographic protocols on the Internet. Unfortunately, the current SSH authenticated encryption mechanism is insecure. In this paper we propose several fixes to the SSH protocol and, using techniques from modern cryptography, we prove that our modified versions of SSH meet strong new chosen ...
Mihir Bellare +2 more
openaire +1 more source
Disk-enabled authenticated encryption
2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), 2010Storage is increasingly becoming a vector for data compromise. Solutions for protecting on-disk data confidentiality and integrity to date have been limited in their effectiveness. Providing authenticated encryption, or simultaneous encryption with integrity information, is important to protect data at rest.
Kevin Butler +2 more
openaire +1 more source
Convertible authenticated encryption scheme
Journal of Systems and Software, 2002The digital signature provides the functions of integration, authentication, and non-repudiation for the signing message. In some applications, however, the signature only needs to be verified by some specified recipients while keeping the message secret from the public. The authenticated encryption schemes can be used to achieve this purpose.
Tzong-Sun Wu, Chien-Lung Hsu
openaire +1 more source
Authenticated Broadcast Encryption Scheme
21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007With the advancement of wireless networks and mobile access devices such as cell phones and PDAs, multimedia services could be offered through wireless broadcast networks to these mobile devices. Therefore, there is a need to securely deliver multimedia content/data to many users over an insecure channel.
Chik How Tan +2 more
openaire +1 more source
Ring authenticated encryption : a new type of authenticated encryption
2004By combining the two notations of ring signature and authenticated encryption together, we introduce a new type of authenticated encryption signature, called ring authenticated encryption, which has the following properties: signer-ambiguity, signer-verifiability, recipient-designation, semantic-security, verification-convertibility, verification ...
Lv, Jiqiang +3 more
openaire +1 more source
Authentication protocols using encryption techniques
2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2016Authentication means to verify the identity. It is the basis for any communication to take place as we do not want to reveal any information which must not be disclosed. In general, authentication requires the presentation of credentials to prove who the user really is.
Venkata SreeKrishna Koganti +3 more
openaire +1 more source

