Results 91 to 100 of about 6,594 (201)

Divertible protocols and atomic proxy cryptography

open access: bronze, 1998
Matt Blaze   +2 more
openalex   +1 more source

Enhancing security in IIoT: RFID authentication protocol for edge computing and blockchain-enabled supply chain

open access: yesCyber Security and Applications
This paper addresses security challenges, especially in the authentication mechanism of Industrial Internet of Things (IIoT)-enabled supply chain systems by proposing an enhanced Radio Frequency Identification (RFID) authentication protocol.
Vikash Kumar, Santosh Kumar Das
doaj  

VERIFICATION OF KEY MANAGEMENT CRYPTOGRAPHIC PROTOCOLS WITH COLORED PETRI NETS

open access: yesВестник Донского государственного технического университета, 2018
The possibility of using colored Petri nets for the analysis of key distribution cryptographic protocols as an example of symmetric Needham—Schroeder protocol is reviewed and evaluated.
Nadezhda S. Mogilevskaya   +1 more
doaj  

Home - About - Disclaimer - Privacy