Results 1 to 10 of about 1,921,242 (301)
To achieve source authentication, message integrity, and non-repudiation, a number of authentication protocols adopt several types of digital signatures: public-key signatures, identity-based signatures, and certificateless signatures.
Kyung-Ah Shim
doaj +1 more source
In the content-centric networking (CCN), the content transmitted between data owners, consumers, and the servers is confidential to its publishers.
Shahriar Badsha +3 more
doaj +1 more source
Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols [PDF]
Anum Sajjad +5 more
openalex +1 more source
This paper addresses security challenges, especially in the authentication mechanism of Industrial Internet of Things (IIoT)-enabled supply chain systems by proposing an enhanced Radio Frequency Identification (RFID) authentication protocol.
Vikash Kumar, Santosh Kumar Das
doaj +1 more source
A Symmetric Key and Elliptic Curve Cryptography-Based Protocol for Message Encryption in Unmanned Aerial Vehicles [PDF]
Vincent Omollo Nyangaresi +6 more
openalex +1 more source
Secure Key Exchange in Tropical Cryptography: Leveraging Efficiency with Advanced Block Matrix Protocols [PDF]
Mariana Durcheva, Kiril Danilchenko
openalex +3 more sources
Design and Development of Biometrics Secure Person Detection System for E-Passport using Cryptographic Security Protocols [PDF]
Vineet Kumar +1 more
openalex +1 more source
Exploring Privacy in Location-based Services Using Cryptographic Protocols [PDF]
Roopa Vishwanathan
openalex +1 more source
An approach to the formal verification of cryptographic protocols [PDF]
Dominique Bolignano
openalex +1 more source
Experimental comparison between one-decoy and two-decoy implementations of the Bennett-Brassard 1984 quantum cryptography protocol [PDF]
Youn-Chang Jeong +2 more
openalex +1 more source

