Results 71 to 80 of about 29,213 (166)

Automatic Intent-Based Secure Service Creation Through a Multilayer SDN Network Orchestration

open access: yes, 2018
Growing traffic demands and increasing security awareness are driving the need for secure services. Current solutions require manual configuration and deployment based on the customer's requirements.
Autenrieth, Achim   +7 more
core   +1 more source

On Leakage-Resilient Authenticated Encryption with Decryption Leakages

open access: yesIACR Transactions on Symmetric Cryptology, 2017
At CCS 2015, Pereira et al. introduced a pragmatic model enabling the study of leakage-resilient symmetric cryptographic primitives based on the minimal use of a leak-free component.
Francesco Berti   +3 more
doaj   +1 more source

Adaptive authentication and key agreement mechanism for future cellular systems [PDF]

open access: yes, 2006
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core  

Verifiable Public Key Encryption With Keyword Search Based on Homomorphic Encryption in Multi-User Setting

open access: yesIEEE Access, 2018
Data security and privacy concerns are important issues in cloud storage. In this paper, we propose a verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting.
D. N. Wu, Q. Q. Gan, X. M. Wang
doaj   +1 more source

Provably Secure Authenticated Encryption

open access: yes, 2018
Authenticated Encryption (AE) is a symmetric key cryptographic primitive that ensures confidentiality and authenticity of processed messages at the same time. The research of AE as a primitive in its own right started in 2000. The security goals of AE were captured in formal definitions in the tradition in the tradition of provable security (such as ...
openaire   +1 more source

Methods of Generating Key Sequences Based on Parameters of Handwritten Passwords and Signatures

open access: yesInformation, 2016
The modern encryption methods are reliable if strong keys (passwords) are used, but the human factor issue cannot be solved by cryptographic methods.
Pavel Lozhnikov   +3 more
doaj   +1 more source

An Improved Authenticated Encryption Scheme

open access: yesIEICE Transactions on Information and Systems, 2011
Authenticated encryption schemes are very useful for private and authenticated communication. In 2010, Rasslan and Youssef showed that the Hwang et al.'s authenticated encryption scheme is not secure by presenting a message forgery attack. However, Rasslan and Youssef did not give how to solve the security issue.
Fagen LI, Jiang DENG, Tsuyoshi TAKAGI
openaire   +2 more sources

Multiplex: TBC-Based Authenticated Encryption with Sponge-Like Rate

open access: yesIACR Transactions on Symmetric Cryptology
Authenticated Encryption (AE) modes of operation based on Tweakable Block Ciphers (TBC) usually measure efficiency in the number of calls to the underlying primitive per message block. On the one hand, many existing solutions reach a primitive-rate of 1,
Yaobin Shen   +2 more
doaj   +1 more source

Predicate-based authenticated key exchange protocol with attribute-hiding

open access: yesTongxin xuebao, 2012
To overcome the problem that available predicate-based authenticated key exchange(PBAKE)protocols had drawback on privacy protection,a new PBAKE protocol was presented.The new protocol was constructed via combining an inner product encryption scheme with
Wen-fen LIU, Jiang-hong WEI, Xue-xian HU
doaj   +2 more sources

Home - About - Disclaimer - Privacy