Results 21 to 30 of about 7,441 (248)

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

C# parser for extracting cryptographic protocols structure from source code

open access: yesТруды Института системного программирования РАН, 2019
Cryptographic protocols are the core of any secure system. With the help of them, data is transmitted securely and protected from third parties' negative impact.
Ilya Aleksandrovich Pisarev   +1 more
doaj   +1 more source

ICRP: Internet-Friendly Cryptographic Relay-Detection Protocol

open access: yesCryptography, 2022
Traffic hijacking over the Internet has become a frequent incident over the last two decades. From minor inconveniences for casual users to massive leaks of governmental data, these events cover an unprecedently large spectrum.
Ghada Arfaoui   +3 more
doaj   +1 more source

Security protocol code analysis method combining model learning and symbolic execution

open access: yes网络与信息安全学报, 2021
Symbolic execution can comprehensively analyze program execution space in theory, but it is not feasible in practice for large programs like security protocols, due to the explosion of path space and the limitation of difficulty in solving path ...
Xieli ZHANG   +3 more
doaj   +3 more sources

Measurement-Device-Independent Two-Party Cryptography with Error Estimation

open access: yesSensors, 2020
We present an innovative method for quantum two-party cryptography. Our protocol introduces joint measurement and error estimation to improve the security of two-party cryptographic protocols. Our protocol removes the assumption of the attacker’s limited
Zishuai Zhou   +4 more
doaj   +1 more source

Is it possible to decide whether a cryptographic protocol is secure or not?

open access: yesJournal of Telecommunications and Information Technology, 2002
We consider the so called ``cryptographic protocols`` whose aim is to ensure some security properties when communication channels are not reliable. Such protocols usually rely on cryptographic primitives.
Hubert Comon, Vitaly Shmatikov
doaj   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Cryptographic Protocols

open access: yes, 2021
Influencés par la pléthore de concepts qu'un cryptographe doit gérer, nous abordons dans cet ouvrage différents domaines de la cryptographie et nous prenons soit le rôle du concepteur, soit celui de l'attaquant. En présentant les deux côtés de la même pièce, nous souhaitons que le lecteur commence à apprécier la beauté de cette science déroutante et qu'
openaire   +3 more sources

A Cryptographic Moving-Knife Cake-Cutting Protocol [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2012
This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players
Yoshifumi Manabe, Tatsuaki Okamoto
doaj   +1 more source

Trivializing Verification of Cryptographic Protocols

open access: yesComputer Assisted Methods in Engineering and Science, 2023
One of the main problems of the digital world is information security. Every second, people process millions of pieces of information that must be protected from unauthorized access.
Jacek Piątkowski, Sabina Szymoniak
doaj   +1 more source

Home - About - Disclaimer - Privacy