Results 21 to 30 of about 1,901,421 (313)

A Secure and Fast Access Protocol for Collecting Terminal in Power Internet of Things based on Symmetric Cryptographic Algorithm [PDF]

open access: yesE3S Web of Conferences, 2021
The development of Power Internet of Things has brought a variety of access requirements for massive collecting terminals. Based on the characteristics of security attributes of Power Internet of Things, this paper proposes a secure access protocol based
Zhai Feng   +4 more
doaj   +1 more source

ICRP: Internet-Friendly Cryptographic Relay-Detection Protocol

open access: yesCryptography, 2022
Traffic hijacking over the Internet has become a frequent incident over the last two decades. From minor inconveniences for casual users to massive leaks of governmental data, these events cover an unprecedently large spectrum.
Ghada Arfaoui   +3 more
doaj   +1 more source

Security protocol code analysis method combining model learning and symbolic execution

open access: yes网络与信息安全学报, 2021
Symbolic execution can comprehensively analyze program execution space in theory, but it is not feasible in practice for large programs like security protocols, due to the explosion of path space and the limitation of difficulty in solving path ...
Xieli ZHANG   +3 more
doaj   +3 more sources

Verification of Implementations of Cryptographic Hash Functions

open access: yesIEEE Access, 2017
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang   +5 more
doaj   +1 more source

Analysis of Cryptographic Protocol by Dynamic Epistemic Logic

open access: yesIEEE Access, 2019
The security of the cryptographic protocols has always been important to ensure proper implementation of a protocol. To assure protocol security, a number of works for analysis and verification of cryptographic protocols have emerged in the literature ...
Xiaojuan Chen, Huiwen Deng
doaj   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols

open access: yesIEEE Security and Privacy, 2022
Tamarin is a mature, state-of-the-art tool for cryptographic protocol verification. We survey some of the larger tour de force results achieved and show how Tamarin can formalize protocols, adversary models, and properties, and scale to substantial, real
D. Basin   +3 more
semanticscholar   +1 more source

C# parser for extracting cryptographic protocols structure from source code

open access: yesТруды Института системного программирования РАН, 2019
Cryptographic protocols are the core of any secure system. With the help of them, data is transmitted securely and protected from third parties' negative impact.
Ilya Aleksandrovich Pisarev   +1 more
doaj   +1 more source

Measurement-Device-Independent Two-Party Cryptography with Error Estimation

open access: yesSensors, 2020
We present an innovative method for quantum two-party cryptography. Our protocol introduces joint measurement and error estimation to improve the security of two-party cryptographic protocols. Our protocol removes the assumption of the attacker’s limited
Zishuai Zhou   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy