Results 21 to 30 of about 6,985 (236)
Lengths May Break Privacy – Or How to Check for Equivalences with Length [PDF]
Security protocols have been successfully analyzed using symbolic models, where messages are represented by terms and protocols by processes. Privacy properties like anonymity or untraceability are typically expressed as equivalence between processes ...
A. Armando +4 more
core +4 more sources
YAPA: A generic tool for computing intruder knowledge [PDF]
Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages based on equational logics, knowledge is typically expressed by two ...
B. Blanchet +12 more
core +5 more sources
A new 3-D chaotic dynamical system with a peanut-shaped closed curve of equilibrium points is introduced in this work. Since the new chaotic system has infinite number of rest points, the new chaotic model exhibits hidden attractors.
Aceng Sambas +8 more
doaj +1 more source
La privacidad de los datos en el Internet de las Cosas Médicas (IoMT) sigue siendo una preocupación crítica cuando se manejan datos biomédicos. Si bien los estudios existentes se centran en la criptografía y la privacidad diferencial, pocos de ellos capturan la utilidad y la autenticidad de los datos.
Shamima Akter, Farhana Reza, Manik Ahmed
openaire +2 more sources
Secure Data De-Duplication Based on Threshold Blind Signature and Bloom Filter in Internet of Things
Within the cloud environment, the availability of storage, as well as bandwidth, can be effectively preserved in virtue of data de-duplication. However, refraining redundancy from additional storage or communication is not trivial due to security ...
Bo Mi +4 more
doaj +1 more source
Feasibility study on security deduplication of medical cloud privacy data
In view of the problem of resource waste caused by the repeated storage of medical data, our scheme proposes that convergent encryption is applied to the medical cloud, and the hash value of the convergent key is used as a repeat detection label and ...
Huiqi Zhao +4 more
doaj +1 more source
Effective Privacy Amplification for Secure Classical Communications [PDF]
We study the practical effectiveness of privacy amplification for classical key-distribution schemes. We find that in contrast to quantum key distribution schemes, the high fidelity of the raw key generated in classical systems allow the users to always ...
Horvath, Tamas +2 more
core +3 more sources
Security Evaluation and Encryption Efficiency Analysis of RC4 Stream Cipher for Converged Network Applications [PDF]
The trend toward converged networks where voice,IP,video and wireless are combined over the same network infrastructure offers significant - and highly attractive - benefits.But this union introduces new vulnerabilities and new opportunities to break into the network and so we need converged security.In this paper we investigate the possibility of ...
Alaa E Din Riad +3 more
openaire +1 more source
The rapid development of communication technologies, the network, advanced computing methods and wireless medical sensors gives rise to a modern medical system.
Xueyan Liu +4 more
doaj +1 more source
Relating two standard notions of secrecy [PDF]
Two styles of definitions are usually considered to express that a security protocol preserves the confidentiality of a data s. Reachability-based secrecy means that s should never be disclosed while equivalence-based secrecy states that two executions ...
B. Blanchet +11 more
core +12 more sources

