Results 241 to 250 of about 1,901,421 (313)
An online tool based on the Internet of Things and intelligent blockchain technology for data privacy and security in rural and agricultural development. [PDF]
Vellimalaipattinam Thiruvenkatasamy K +3 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the fourteenth annual ACM symposium on Theory of computing - STOC '82, 1982
A cryptographic transformation is a mapping f from a set of cleartext messages, M, to a set of ciphertext messages. Since for m e M, f(m) should hide the contents of m from an enemy, f-1 should, in a certain technical sense, be difficult to infer from f(m) and public knowledge about f.
Richard A. DeMillo +2 more
openaire +2 more sources
A cryptographic transformation is a mapping f from a set of cleartext messages, M, to a set of ciphertext messages. Since for m e M, f(m) should hide the contents of m from an enemy, f-1 should, in a certain technical sense, be difficult to infer from f(m) and public knowledge about f.
Richard A. DeMillo +2 more
openaire +2 more sources
An improved version of the AAG cryptographic protocol
Groups Complex. Cryptol., 2019An improved version of the Anshel–Anshel–Goldfeld (AAG) algebraic cryptographic key-exchange scheme, that is in particular resistant against the Tsaban linear span cryptanalysis, is established.
V. Roman’kov
semanticscholar +1 more source
A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of Things
ACM Transactions on Embedded Computing Systems, 2019The universality of smart-devices has brought rapid development and the significant advancement of ubiquitous applications for the Internet of Things (IoT).
Lu Zhou, Chunhua Su, Kuo-Hui Yeh
semanticscholar +1 more source
Hybrid Cryptographic Protocol for Secure Vehicle Data Sharing Over a Consortium Blockchain
2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2018The blockchain technology has recently attracted increasing interests in a wide range of use-cases. Among those, the management of vehicles' data and life cycle over a blockchain has sparked various research initiatives on a global scale, with the ...
Kei-Léo Brousmiche +5 more
semanticscholar +1 more source
Visualization of cryptographic protocols with GRACE
Journal of Visual Languages & Computing, 2008In this paper we present GRACE (graphical representation and animation for cryptography education), a Java-based educational tool that can be used to help in teaching and understanding of cryptographic protocols. The tool adopts an active learning model that engages the learner by asking him to describe, in an exemplification of a real-world scenario ...
CATTANEO, Giuseppe +2 more
openaire +3 more sources
A Quantum Cryptographic Protocol for Secure Vehicular Communication
IEEE transactions on intelligent transportation systems (Print)In foggy highways, the secure vehicular communication system can be very important in preventing traffic chaos, congestion, and accident; however, potential attackers may hack this system that can create many problems in controlling or managing the ...
Kartick Sutradhar
semanticscholar +1 more source
Verifiable Verification in Cryptographic Protocols
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023Common verification steps in cryptographic protocols, such as signature or message authentication code checks or the validation of elliptic curve points, are crucial for the overall security of the protocol. Yet implementation errors omitting these steps easily remain unnoticed, as often the protocol will function perfectly anyways.
Marc Fischlin, Felix Günther
openaire +1 more source

