Results 21 to 30 of about 253,734 (274)

A Forward-Secure Signature with Backward-Secure Detection [PDF]

open access: yes2008 International Conference on Information Security and Assurance (isa 2008), 2008
In this paper, we propose a method to enhance the security of Abdalla and Reyzin 's forward-secure signature scheme, by producing a backward-secure detection. In the proposed scheme, we embedded the hash-chain into the forward-secure signature scheme. It achieves not only forward-security but also backward-security for the digital signature.
D.J. Guan, Dai-Rui Lin, Chih-I Wang
openaire   +1 more source

A Lightweight Authentication Protocol for UAVs Based on ECC Scheme

open access: yesDrones, 2023
With the rapid development of unmanned aerial vehicles (UAVs), often referred to as drones, their security issues are attracting more and more attention.
Shuo Zhang   +3 more
doaj   +1 more source

Secure Bilevel Asynchronous Vertical Federated Learning with Backward Updating

open access: yesProceedings of the AAAI Conference on Artificial Intelligence, 2021
Vertical federated learning (VFL) attracts increasing attention due to the emerging demands of multi-party collaborative modeling and concerns of privacy leakage. In the real VFL applications, usually only one or partial parties hold labels, which makes it challenging for all parties to collaboratively learn the model without privacy leakage. Meanwhile,
Zhang, Qingsong   +3 more
openaire   +2 more sources

AES-LBBB: AES Mode for Lightweight and BBB-Secure Authenticated Encryption

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
In this paper, a new lightweight authenticated encryption scheme AESLBBB is proposed, which was designed to provide backward compatibility with advanced encryption standard (AES) as well as high security and low memory.
Yusuke Naito   +2 more
doaj   +1 more source

RFID Tag Group Ownership Transfer Protocol Satisfying Backward Security [PDF]

open access: yesJisuanji gongcheng, 2019
Most of tag ownership transfer protocols are only applicable to the single tag ownership transfer,and are not suitable for the tag group transfer at one time.To solve this problem,a Radio Frequency Identification(RFID) tag group ownership transfer ...
WEI Fang,ZOU Zhige
doaj   +1 more source

An Improved and Secure RFID Group Tag Ownership Transfer Protocol [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the security issues such as backward privacy leakage and violent cracking in the existing Radio Frequency Identification(RFID) group label ownership transfer protocol,an improved ownership transfer protocol is proposed.The word randomization ...
YIN Shoujun
doaj   +1 more source

M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices

open access: yesIEEE Access, 2018
Searchable encryption allows mobile devices with limited computing and storage resources to outsource data to an untrusted cloud server. Users are able to search and retrieve the outsourced data; however, it suffers from information and privacy leakage ...
Chongzhi Gao   +5 more
doaj   +1 more source

Introduction. Out of Hidden India: Adivasi Histories, Stories, Visual Arts and Performances [PDF]

open access: yes, 2015
This issue of Anglistica AION is dedicated to indigenous India and to some of its forms of emerging subjectivity. After having been studied by ethnoanthropologists as cultural exceptions or worse after having embodied the stereotype of the ‘born ...
Ciocca, Rossella, DAS GUPTA, Sanjukta
core   +1 more source

A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization

open access: yesIEEE Access, 2021
The widespread use of Unmanned Aerial Vehicles (UAV) has made the security and computing resource application efficiency of UAV a hot topic in the security field of the Internet of Things.
Yuan Lei   +4 more
doaj   +1 more source

Dynamic searchable symmetric encryption schemes with forward and backward security

open access: yesIOP Conference Series: Materials Science and Engineering, 2020
Abstract Dynamic searchable symmetric encryption (DSSE) is helpful to users with limited storage. In DSSE, the users are able to perform search and update queries on the ciphertext which stored on the cloud server. However, DSSE may suffer from file-injection attacks and leak information after deletion.
Ke Huang   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy