Results 31 to 40 of about 253,734 (274)
A resilient key predistribution scheme for multiphase wireless sensor networks [PDF]
In wireless sensor networks, sensor nodes eventually die due to battery depletion. Wireless sensor networks (WSNs) in which new nodes are periodically redeployed with certain intervals, called generations, to replace the dead nodes are called multi-phase
Ergun, Murat +3 more
core +2 more sources
A Blockchain-Based Authentication and Dynamic Group Key Agreement Protocol
With the rapid development of mobile networks, there are more and more application scenarios that require group communication. For example, in mobile edge computing, group communication can be used to transmit messages to all group members with minimal ...
Zisang Xu +5 more
doaj +1 more source
Using Backward Induction Techniques in (Timed) Security Protocols Verification [PDF]
This paper shows a new way of automatic verification of properties of untimed and timed security protocols. To do this we use a modified version of previously introduced formal model based on a network of synchronized (timed) automata that expreses behaviour and distributed knowledge of users during protocol executions.
Kurkowski, Mirosław +2 more
openaire +2 more sources
Uneven key pre-distribution scheme for multi-phase wireless sensor networks [PDF]
In multi-phase Wireless Sensor Networks (WSNs), sensor nodes are redeployed periodically to replace nodes whose batteries are depleted. In order to keep the network resilient against node capture attacks across different deployment epochs, called ...
Catakoglu, Abdullah Onur +2 more
core +2 more sources
Bell's Theorem Versus Local Realism in a Quaternionic Model of Physical Space [PDF]
In the context of EPR-Bohm type experiments and spin detections confined to spacelike hypersurfaces, a local, deterministic and realistic model within a Friedmann-Robertson-Walker spacetime with a constant spatial curvature (S^3 ) is presented that ...
Christian, Joy
core +3 more sources
Because the majority of information in the industrial Internet of things (IIoT) is transmitted over an open and insecure channel, it is indispensable to design practical and secure authentication and key agreement protocols.
Xingwen Zhao, Dexin Li, Hui Li
doaj +1 more source
XDRBG: A Proposed Deterministic Random Bit Generator Based on Any XOF
A deterministic random bit generator (DRBG) generates pseudorandom bits from an unpredictable seed, i.e., a seed drawn from any random source with sufficient entropy.
John Kelsey +2 more
doaj +1 more source
DSTC: DNS-based Strict TLS Configurations
Most TLS clients such as modern web browsers enforce coarse-grained TLS security configurations. They support legacy versions of the protocol that have known design weaknesses, and weak ciphersuites that provide fewer security guarantees (e.g.
AJ Menezes +3 more
core +1 more source
A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks [PDF]
Pairwise key distribution among the sensor nodes is an essential problem for providing security in Wireless Sensor Networks (WSNs). The common approach for this problem is random key predistribution, which suffers from resiliency issues in case of node ...
Kalkan, Kubra +6 more
core +2 more sources
Attribute-based revocable collaborative access control scheme
To solve the dynamic update of access rights in attribute-based collaborative access control, a novel scheme was proposed with the revocation of attribute, user and collaborative policy.A formal definition and a security model were presented, the group ...
Changgen PENG +4 more
doaj +2 more sources

