Results 21 to 30 of about 80,103 (295)
Probability on groups and an application to cryptography [PDF]
In her thesis, Mosina introduced the concept of {\it mean-set of random (graph-) group-variables} and generalized Strong Law of Large Numbers (SLLN) to (graphs) groups, which she used for cryptanalysis of authentication schemes.
Sidoine Djimnaibeye +2 more
doaj
PEMBUKTIAN DALAM PERKARA PERCERAIAN DENGAN ALASAN PERSELISIHAN
Civil Law was public law which was imperative so it tied everyone, especially in investigating witness incourt. It was determined that judge forbade to get witness from blood relative as the base to take decision.However it was not an absolute regulation.
I Gusti Ngurah Adnyana
doaj +1 more source
Protection of personal data under martial law in Ukraine
The article is devoted to the issue of personal data protection under martial law in Ukraine. A detailed study of this issue has been carried out, aspects of the regulatory environment and levels of personal data protection in such difficult conditions ...
V. A. Svitlychnyi
doaj +1 more source
Nudging folks towards stronger password choices:providing certainty is the key [PDF]
Persuading people to choose strong passwords is challenging. One way to influence password strength, as and when people are making the choice, is to tweak the choice architecture to encourage stronger choice.
Renaud, Karen, Zimmerman, Vera
core +4 more sources
Roadmap on optical security [PDF]
Postprint (author's final ...
Javidi, Bahram +2 more
core +2 more sources
Mean-Set Attack: Cryptanalysis of Sibert et al. Authentication Protocol
We analyze the Sibert et al. group-based (Feige-Fiat-Shamir type) authentication protocol and show that the protocol is not computationally zero-knowledge.
Mosina, Natalia, Ushakov, Alexander
core +1 more source
KALwEN: a new practical and interoperable key management scheme for body sensor networks [PDF]
Key management is the pillar of a security architecture. Body sensor networks (BSNs) pose several challenges–some inherited from wireless sensor networks (WSNs), some unique to themselves–that require a new key management scheme to be tailor-made.
Gong, Zheng +4 more
core +3 more sources
The Criminal Law Behind Digital Fingerprints: Biometric Data Protection in Modern Security Systems [PDF]
Biometric data, such as fingerprints, facial recognition, retina scans, and voice scans, constitute unique and irreplaceable forms of personal identification.
Yuliartini Ni Putu Rai +2 more
doaj +1 more source
Biometric Identification by Fingerprint Image Based Minutiae Detection [PDF]
In an increasingly digital world, reliable personal authentication has become an important human computer interface application, some examples where establishing a person’s identity.
Israa Mohamed Khidher
doaj +1 more source
Secure SIP authentication scheme supporting lawful interception
ABSTRACTThe session initiation protocol (SIP) is the most widely used signaling protocol for creating, modifying, and terminating multimedia sessions in an Internet Protocol‐based telephony environment. Recently, Arshad et al. proposed an authentication scheme based on elliptic curve cryptosystems for SIP. In this paper, we first show that their scheme
Qiong Pu, Jian Wang, Shuhua Wu
openaire +1 more source

