Results 231 to 240 of about 253,734 (274)
Some of the next articles are maybe not open access.

Lightweight RFID authentication with forward and backward security

ACM Transactions on Information and System Security, 2011
We propose a lightweight RFID authentication protocol that supports forward and backward security. The only cryptographic mechanism that this protocol uses is a pseudorandom number generator (PRNG) that is shared with the backend Server. Authentication is achieved by exchanging a few numbers (3 or 5) drawn from the PRNG.
Mike Burmester, Jorge Munilla
openaire   +3 more sources

‘The Backward Will Be Beaten’: Historical Lesson, Security, and Nationalism in China

Journal of Contemporary China, 2020
What has China learned from the ‘Century of Humiliation’? In China’s mnemonic practices, ‘the backward will be beaten,’ which attributes the nation’s humiliation experiences to economic, military, ...
Yi Wang
openaire   +3 more sources

VoIP Secure Communication Protocol satisfying Backward Compatibility

2007 Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007
Several VoIP security protocols have been standardized for preventing many VoIP threats. But since several VoIP carriers have different VoIP protocols, end-to-end VoIP secure communication can not be possible. Also when initiator using secure VoIP phone wants a secure communication with responder using non-VoIP phone such as PSTN phone, or cellular ...
Joongman Kim   +3 more
openaire   +1 more source

Forward and backward secure keyword search with flexible keyword shielding

Information Sciences, 2021
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Zhijun   +4 more
openaire   +1 more source

Efficient Verifiable Dynamic Searchable Symmetric Encryption With Forward and Backward Security

IEEE Internet of Things Journal
Chenbin Zhao   +6 more
openaire   +3 more sources

Fast automatic synthesis of security protocols using backward search

Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003
An automatic security protocol generator is proposed that used logic-based synthesis rules to guide it in a backward search for suitable protocols from protocol goals. The approach taken is unlike existing automatic protocol generators which typically carry out a forward search for candidate protocols from the protocol assumptions.
Hongbin Zhou, Simon N. Foley
openaire   +1 more source

Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption

Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Symmetric Searchable Encryption (SSE) has received wide attention due to its practical application in searching on encrypted data. Beyond search, data addition and deletion are also supported in dynamic SSE schemes. Unfortunately, these update operations leak some information of updated data.
Shi-Feng Sun   +6 more
openaire   +1 more source

Bestie: Very Practical Searchable Encryption with Forward and Backward Security

2021
Dynamic searchable symmetric-key encryption (DSSE) is a promising crypto-tool that enables secure keyword searching over dynamically added or deleted ciphertexts. Currently, many works on DSSE devote their efforts to obtaining forward and backward security and practical performance.
Tianyang Chen   +5 more
openaire   +1 more source

Securing mineral supply: backwards vertical integration for technology companies

2023
The demand for minerals has increased with the growing production of standard technologies, such as EV car batteries, wind turbines, and solar panels. However, major mining companies need help to satisfy the demand at the current rate, leading to inconsistent and expensive supply chains and environmental and geopolitical concerns.
openaire   +1 more source

Backward Cloud Based Elimination of Uncertainty in Security Assessment Parameters

2010 International Conference on Electrical and Control Engineering, 2010
The uncertainty in selection of security assessment parameters heavily affects the accuracy and credibility of the assessment results. The method of selection based on opinion of group experts lacks the ability of describing the uncertainty in the selection procedure, and the method based on interval matrixes does not measure the degree of credibility ...
Bing Xia, Xiangdong Li, Qiusheng Zheng
openaire   +1 more source

Home - About - Disclaimer - Privacy