A Post-Quantum Secure RFID Authentication Protocol Based on NTRU Encryption Algorithm. [PDF]
Liu H, Wu H, Ge N, Dong Q.
europepmc +1 more source
Design of a multi-layered privacy-preserving architecture for secure medical data exchange in cloud environments. [PDF]
Muthuvel S, Priya S, Sampath Kumar K.
europepmc +1 more source
A Lightweight IDS Based on Blockchain and Machine Learning for Detecting Physical Attacks in Wireless Sensor Networks. [PDF]
Jabor MS +3 more
europepmc +1 more source
A Lightweight Authentication and Key Distribution Protocol for XR Glasses Using PUF and Cloud-Assisted ECC. [PDF]
Cha W, Lee HJ, Kook S, Kim K, Won D.
europepmc +1 more source
Privacy-Preserving ECC-Based AKA for Resource-Constrained IoT Sensor Networks with Forgotten Password Reset. [PDF]
Yu Y, Wei K, Qi K, Wu W.
europepmc +1 more source
Secure, scalable, and interoperable healthcare data exchange using layer-2 ZK-rollups, smart contracts, and IPFS. [PDF]
Raghav A +5 more
europepmc +1 more source
Lightweight three-factor authentication protocol for 6G-enabled healthcare systems using Chebyshev chaotic maps and BioHashing. [PDF]
Abbas AM, Nasr ME, Abdelfatah RI.
europepmc +1 more source
Post-Quantum Revocable Linkable Ring Signature Scheme Based on SPHINCS+ for V2G Scenarios. [PDF]
Liu S, Du YN, Wang XA, Hu X, Su HE.
europepmc +1 more source
Comparative Analysis of Different Cryptographic Hash Functions
Cryptographic hash functions are crucial tools used to protect information in digital devices. These functions take an input of various size consisting of characters and convert it to a digest of fixed size, known as a hash value. The functions produce the same hash value when using the same input, and are not invertible.
Kaufmann, Alex, Gartmon, Emelie
openaire +1 more source
A Security-Enhanced Certificateless Aggregate Authentication Protocol with Revocation for Wireless Medical Sensor Networks. [PDF]
Fan Q, Wang Y, Li X.
europepmc +1 more source

