Results 81 to 90 of about 21,314 (180)

IoT and Man‐in‐the‐Middle Attacks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni   +2 more
wiley   +1 more source

Adaptable Cryptographic Primitives in Blockchains via Smart Contracts [PDF]

open access: gold, 2022
Riccardo Longo   +4 more
openalex   +1 more source

Cryptographic Primitives Based on Hard Learning Problems [PDF]

open access: yes, 1994
Modern cryptography has had considerable impact on the development of computational learning theory. Virtually every intractability result in Valiant’s model [13] (which is representation-independent in the sense that it does not rely on an artificial syntactic restriction on the learning algorithm’s hypotheses) has at its heart a cryptographic ...
Merrick L. Furst   +3 more
openaire   +2 more sources

Utilising Explainable AI to Enhance Real‐Time Student Performance Prediction in Educational Serious Games

open access: yesExpert Systems, Volume 42, Issue 3, March 2025.
ABSTRACT In recent years, serious games (SGs) have emerged as a powerful tool in education by combining pedagogy and entertainment, facilitating the acquisition of knowledge and skills in engaging environments. SGs enable the collection of valuable interaction data from students, allowing for the analysis of student performance, with artificial ...
Manuel J. Gomez   +4 more
wiley   +1 more source

Post-quantum signature algorithms based on the hidden discrete logarithm problem [PDF]

open access: yesComputer Science Journal of Moldova, 2018
New options of the hidden discrete logarithm problem are proposed as cryptographic primitive of the post-quantum signature algorithms. Two signature schemes using computations in finite non-commutative algebras with associative multiplication operation
A.A. Moldovyan, N.A. Moldovyan
doaj  

Connectivity of Markoff mod‐p graphs and maximal divisors

open access: yesProceedings of the London Mathematical Society, Volume 130, Issue 2, February 2025.
Abstract Markoff mod‐p$p$ graphs are conjectured to be connected for all primes p$p$. In this paper, we use results of Chen and Bourgain, Gamburd, and Sarnak to confirm the conjecture for all p>3.45·10392$p > 3.45\cdot 10^{392}$. We also provide a method that quickly verifies connectivity for many primes below this bound.
Jillian Eddy   +4 more
wiley   +1 more source

No Superluminal Signaling Implies Unconditionally Secure Bit Commitment [PDF]

open access: yes, 2014
Bit commitment (BC) is an important cryptographic primitive for an agent to convince a mutually mistrustful party that she has already made a binding choice of 0 or 1 but only to reveal her choice at a later time. Ideally, a BC protocol should be simple,
Chau, H. F.   +2 more
core  

Advances in Metal Halide Perovskite Memristors: A Review from a Co‐Design Perspective

open access: yesAdvanced Science, Volume 12, Issue 2, January 13, 2025.
This work presents a thorough review of the metal halide perovskite (MHP) memristors, covering materials to applications. The design principles and critical factors affecting device performance are summarized. The mechanism of MHP memristors is also concerned with deeper insight into fundamental principles.
Bowen Jiang   +10 more
wiley   +1 more source

Efficient Length Doubling From Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We present a length doubler, LDT, that turns an n-bit tweakable block cipher into an efficient and secure cipher that can encrypt any bit string of length [n..2n − 1].
Yu Long Chen   +3 more
doaj   +1 more source

Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities

open access: yesEngineering Reports, Volume 7, Issue 1, January 2025.
We develop an anonymous authentication scheme for smart cities based on physically unclonable function and user biometrics. This scheme is shown to be robust against active and passive attacks. ABSTRACT Smart cities amalgamate technologies such as Internet of Things, big data analytics, and cloud computing to collect and analyze large volumes of data ...
Vincent Omollo Nyangaresi   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy