A transport-independent general purpose cryptographic protocol
The article considers the problem of the transport-independent cryptographic protocol. We analyze requirements for general purpose cryptographic protocol. An analysis of existing protocols is performed to highlight their drawbacks. A protocol schema and
К. Лесогорський+1 more
doaj +1 more source
A Secure and Fast Access Protocol for Collecting Terminal in Power Internet of Things based on Symmetric Cryptographic Algorithm [PDF]
The development of Power Internet of Things has brought a variety of access requirements for massive collecting terminals. Based on the characteristics of security attributes of Power Internet of Things, this paper proposes a secure access protocol based
Zhai Feng+4 more
doaj +1 more source
Cryptographic Protocol with Keyless Sensors Authentication for WBAN in Healthcare Applications
Nowadays, technological advances provide people with more facilities and luxuries in life. Medicine is no exception; for example, different wireless sensors can be used to monitor patients’ state of health.
Kevin Andrae Delgado-Vargas+2 more
doaj +1 more source
Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic
The security of cryptographic protocols has always been an important issue. Although there are various verification schemes of protocols in the literature, efficiently and accurately verifying cryptographic protocols is still a challenging research task.
Xiaojuan Chen, Huiwen Deng
doaj +1 more source
Security protocol code analysis method combining model learning and symbolic execution
Symbolic execution can comprehensively analyze program execution space in theory, but it is not feasible in practice for large programs like security protocols, due to the explosion of path space and the limitation of difficulty in solving path ...
Xieli ZHANG+3 more
doaj +3 more sources
Cryptographic mechanisms for secure interaction of control and measuring devices
The paper describes the key features of the cryptographic protocol providing secure interaction between control and measuring devices. The hierarchical structure underlying this protocol and the relationship between the transport and session levels of ...
Alexey Yu. Nesterenko+1 more
doaj +1 more source
ICRP: Internet-Friendly Cryptographic Relay-Detection Protocol
Traffic hijacking over the Internet has become a frequent incident over the last two decades. From minor inconveniences for casual users to massive leaks of governmental data, these events cover an unprecedently large spectrum.
Ghada Arfaoui+3 more
doaj +1 more source
Verification of Implementations of Cryptographic Hash Functions
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang+5 more
doaj +1 more source
Analysis of Cryptographic Protocol by Dynamic Epistemic Logic
The security of the cryptographic protocols has always been important to ensure proper implementation of a protocol. To assure protocol security, a number of works for analysis and verification of cryptographic protocols have emerged in the literature ...
Xiaojuan Chen, Huiwen Deng
doaj +1 more source
Measurement-Device-Independent Two-Party Cryptography with Error Estimation
We present an innovative method for quantum two-party cryptography. Our protocol introduces joint measurement and error estimation to improve the security of two-party cryptographic protocols. Our protocol removes the assumption of the attacker’s limited
Zishuai Zhou+4 more
doaj +1 more source