Results 11 to 20 of about 467 (189)

RFID Tag Group Ownership Transfer Protocol Satisfying Backward Security [PDF]

open access: yesJisuanji gongcheng, 2019
Most of tag ownership transfer protocols are only applicable to the single tag ownership transfer,and are not suitable for the tag group transfer at one time.To solve this problem,a Radio Frequency Identification(RFID) tag group ownership transfer ...
WEI Fang,ZOU Zhige
doaj   +1 more source

An Improved and Secure RFID Group Tag Ownership Transfer Protocol [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the security issues such as backward privacy leakage and violent cracking in the existing Radio Frequency Identification(RFID) group label ownership transfer protocol,an improved ownership transfer protocol is proposed.The word randomization ...
YIN Shoujun
doaj   +1 more source

M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices

open access: yesIEEE Access, 2018
Searchable encryption allows mobile devices with limited computing and storage resources to outsource data to an untrusted cloud server. Users are able to search and retrieve the outsourced data; however, it suffers from information and privacy leakage ...
Chongzhi Gao   +5 more
doaj   +1 more source

A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization

open access: yesIEEE Access, 2021
The widespread use of Unmanned Aerial Vehicles (UAV) has made the security and computing resource application efficiency of UAV a hot topic in the security field of the Internet of Things.
Yuan Lei   +4 more
doaj   +1 more source

Security of LoRaWAN v1.1 in Backward Compatibility Scenarios

open access: yesProcedia Computer Science, 2018
Abstract We present security vulnerabilities of LoRaWAN v1.1 in backward compatibility scenarios and propose countermeasures. Novel low-power wireless communication technologies are continuously introduced into the IoT ecosystem, while the existing ones continue their evolution by adding new features and fixing known problems. Since most of IoT-based
Nigussie Ethiopia, Dönmez Tahsin
openaire   +1 more source

Dynamic searchable symmetric encryption schemes with forward and backward security

open access: yesIOP Conference Series: Materials Science and Engineering, 2020
Abstract Dynamic searchable symmetric encryption (DSSE) is helpful to users with limited storage. In DSSE, the users are able to perform search and update queries on the ciphertext which stored on the cloud server. However, DSSE may suffer from file-injection attacks and leak information after deletion.
Ke Huang   +3 more
openaire   +1 more source

A Blockchain-Based Authentication and Dynamic Group Key Agreement Protocol

open access: yesSensors, 2020
With the rapid development of mobile networks, there are more and more application scenarios that require group communication. For example, in mobile edge computing, group communication can be used to transmit messages to all group members with minimal ...
Zisang Xu   +5 more
doaj   +1 more source

Using Backward Induction Techniques in (Timed) Security Protocols Verification [PDF]

open access: yes, 2013
This paper shows a new way of automatic verification of properties of untimed and timed security protocols. To do this we use a modified version of previously introduced formal model based on a network of synchronized (timed) automata that expreses behaviour and distributed knowledge of users during protocol executions.
Kurkowski, Mirosław   +2 more
openaire   +2 more sources

Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things

open access: yesSensors, 2022
Because the majority of information in the industrial Internet of things (IIoT) is transmitted over an open and insecure channel, it is indispensable to design practical and secure authentication and key agreement protocols.
Xingwen Zhao, Dexin Li, Hui Li
doaj   +1 more source

XDRBG: A Proposed Deterministic Random Bit Generator Based on Any XOF

open access: yesIACR Transactions on Symmetric Cryptology
A deterministic random bit generator (DRBG) generates pseudorandom bits from an unpredictable seed, i.e., a seed drawn from any random source with sufficient entropy.
John Kelsey   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy