Results 21 to 30 of about 1,926,564 (269)
How much security does Y-00 protocol provide us ? [PDF]
New quantum cryptography, often called Y-00 protocol, has much higher performance than the conventional quantum cryptographies. It seems that the conventional quantum cryptographic attacks are inefficient at Y-00 protocol as its security is based on the ...
Hasegawa, Toshio +4 more
core +1 more source
Security Threats and Cryptographic Protocols for Medical Wearables
In the past few years, the use of several medical devices is increasing. This paper will pay attention to a device developed to get measures of the temperature of diabetic foot.
Luis Hernández-Álvarez +3 more
semanticscholar +1 more source
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source
Measurement-Device-Independent Two-Party Cryptography with Error Estimation
We present an innovative method for quantum two-party cryptography. Our protocol introduces joint measurement and error estimation to improve the security of two-party cryptographic protocols. Our protocol removes the assumption of the attacker’s limited
Zishuai Zhou +4 more
doaj +1 more source
A Cryptographic Moving-Knife Cake-Cutting Protocol [PDF]
This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players
Yoshifumi Manabe, Tatsuaki Okamoto
doaj +1 more source
Delphi: A Cryptographic Inference System for Neural Networks
Many companies provide neural network prediction services to users for a wide range of applications. However, current prediction systems compromise one party's privacy: either the user has to send sensitive inputs to the service provider for ...
Pratyush Mishra +4 more
semanticscholar +1 more source
Crypto-Verifying Protocol Implementations in ML [PDF]
We intend to narrow the gap between concrete implementations and verified models of cryptographic protocols. We consider protocols implemented in F#, a variant of ML, and verified using CryptoVerif, Blanchet's protocol verifier for computational ...
Bhargavan, K., Corin, R.J., Fournet, C.
core +13 more sources
Trivializing Verification of Cryptographic Protocols
One of the main problems of the digital world is information security. Every second, people process millions of pieces of information that must be protected from unauthorized access.
Jacek Piątkowski, Sabina Szymoniak
doaj +1 more source
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol
WireGuard is a free and open source Virtual Private Network (VPN) that aims to replace IPsec and OpenVPN. It is based on a new cryptographic protocol derived from the Noise Protocol Framework.
Benjamin Lipp, B. Blanchet, K. Bhargavan
semanticscholar +1 more source

