Results 71 to 80 of about 29,213 (166)
Automatic Intent-Based Secure Service Creation Through a Multilayer SDN Network Orchestration
Growing traffic demands and increasing security awareness are driving the need for secure services. Current solutions require manual configuration and deployment based on the customer's requirements.
Autenrieth, Achim +7 more
core +1 more source
On Leakage-Resilient Authenticated Encryption with Decryption Leakages
At CCS 2015, Pereira et al. introduced a pragmatic model enabling the study of leakage-resilient symmetric cryptographic primitives based on the minimal use of a leak-free component.
Francesco Berti +3 more
doaj +1 more source
Adaptive authentication and key agreement mechanism for future cellular systems [PDF]
Since the radio medium can be accessed by anyone, authentication of users is a very important element of a mobile network. Nowadays, in GSM/GPRS a challenge response protocol is used to authenticate the user to the mobile network.
Dimitriou, T., Komninos, N.
core
Data security and privacy concerns are important issues in cloud storage. In this paper, we propose a verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting.
D. N. Wu, Q. Q. Gan, X. M. Wang
doaj +1 more source
Provably Secure Authenticated Encryption
Authenticated Encryption (AE) is a symmetric key cryptographic primitive that ensures confidentiality and authenticity of processed messages at the same time. The research of AE as a primitive in its own right started in 2000. The security goals of AE were captured in formal definitions in the tradition in the tradition of provable security (such as ...
openaire +1 more source
Methods of Generating Key Sequences Based on Parameters of Handwritten Passwords and Signatures
The modern encryption methods are reliable if strong keys (passwords) are used, but the human factor issue cannot be solved by cryptographic methods.
Pavel Lozhnikov +3 more
doaj +1 more source
An Improved Authenticated Encryption Scheme
Authenticated encryption schemes are very useful for private and authenticated communication. In 2010, Rasslan and Youssef showed that the Hwang et al.'s authenticated encryption scheme is not secure by presenting a message forgery attack. However, Rasslan and Youssef did not give how to solve the security issue.
Fagen LI, Jiang DENG, Tsuyoshi TAKAGI
openaire +2 more sources
Multiplex: TBC-Based Authenticated Encryption with Sponge-Like Rate
Authenticated Encryption (AE) modes of operation based on Tweakable Block Ciphers (TBC) usually measure efficiency in the number of calls to the underlying primitive per message block. On the one hand, many existing solutions reach a primitive-rate of 1,
Yaobin Shen +2 more
doaj +1 more source
Security analysis and secure channel-free certificateless searchable public key authenticated encryption for a cloud-based Internet of things. [PDF]
Wu B, Wang C, Yao H.
europepmc +1 more source
Predicate-based authenticated key exchange protocol with attribute-hiding
To overcome the problem that available predicate-based authenticated key exchange(PBAKE)protocols had drawback on privacy protection,a new PBAKE protocol was presented.The new protocol was constructed via combining an inner product encryption scheme with
Wen-fen LIU, Jiang-hong WEI, Xue-xian HU
doaj +2 more sources

