Results 21 to 30 of about 1,926,564 (269)

How much security does Y-00 protocol provide us ? [PDF]

open access: yes, 2003
New quantum cryptography, often called Y-00 protocol, has much higher performance than the conventional quantum cryptographies. It seems that the conventional quantum cryptographic attacks are inefficient at Y-00 protocol as its security is based on the ...
Hasegawa, Toshio   +4 more
core   +1 more source

Security Threats and Cryptographic Protocols for Medical Wearables

open access: yesMathematics, 2022
In the past few years, the use of several medical devices is increasing. This paper will pay attention to a device developed to get measures of the temperature of diabetic foot.
Luis Hernández-Álvarez   +3 more
semanticscholar   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Measurement-Device-Independent Two-Party Cryptography with Error Estimation

open access: yesSensors, 2020
We present an innovative method for quantum two-party cryptography. Our protocol introduces joint measurement and error estimation to improve the security of two-party cryptographic protocols. Our protocol removes the assumption of the attacker’s limited
Zishuai Zhou   +4 more
doaj   +1 more source

A Cryptographic Moving-Knife Cake-Cutting Protocol [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2012
This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players
Yoshifumi Manabe, Tatsuaki Okamoto
doaj   +1 more source

Delphi: A Cryptographic Inference System for Neural Networks

open access: yesIACR Cryptology ePrint Archive, 2020
Many companies provide neural network prediction services to users for a wide range of applications. However, current prediction systems compromise one party's privacy: either the user has to send sensitive inputs to the service provider for ...
Pratyush Mishra   +4 more
semanticscholar   +1 more source

Crypto-Verifying Protocol Implementations in ML [PDF]

open access: yes, 2007
We intend to narrow the gap between concrete implementations and verified models of cryptographic protocols. We consider protocols implemented in F#, a variant of ML, and verified using CryptoVerif, Blanchet's protocol verifier for computational ...
Bhargavan, K., Corin, R.J., Fournet, C.
core   +13 more sources

Trivializing Verification of Cryptographic Protocols

open access: yesComputer Assisted Methods in Engineering and Science, 2023
One of the main problems of the digital world is information security. Every second, people process millions of pieces of information that must be protected from unauthorized access.
Jacek Piątkowski, Sabina Szymoniak
doaj   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol

open access: yesEuropean Symposium on Security and Privacy, 2019
WireGuard is a free and open source Virtual Private Network (VPN) that aims to replace IPsec and OpenVPN. It is based on a new cryptographic protocol derived from the Noise Protocol Framework.
Benjamin Lipp, B. Blanchet, K. Bhargavan
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy