Results 31 to 40 of about 579 (46)

Analysis of cyberspace security based on game theory

open access: yes网络与信息安全学报, 2015
Information security economics is an important research area and game theory is one of the main basic theories and tools of cyberspace security.Based on game theory,the main problems of cyberspace securing were analyzed which including network attack and
Jian-ming ZHU, Qin WANG
doaj   +3 more sources

LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory

open access: yesIET Information Security
The π-calculus is a basic theory of mobile communication based on the notion of interaction, which, is aimed at analyzing and modeling the behaviors of communication processes in communicating and mobile systems, and is widely applied to the security ...
Fusheng Wu   +3 more
doaj   +1 more source

Security Analysis of Various Authentication Schemes Based on Three Types of Digital Signature Schemes

open access: yesIEEE Access, 2018
To achieve source authentication, message integrity, and non-repudiation, a number of authentication protocols adopt several types of digital signatures: public-key signatures, identity-based signatures, and certificateless signatures.
Kyung-Ah Shim
doaj   +1 more source

Designing Privacy-Preserving Protocols for Content Sharing and Aggregation in Content Centric Networking

open access: yesIEEE Access, 2018
In the content-centric networking (CCN), the content transmitted between data owners, consumers, and the servers is confidential to its publishers.
Shahriar Badsha   +3 more
doaj   +1 more source

Formal verification for a PMQTT protocol

open access: yesEgyptian Informatics Journal, 2020
The future of Internet of Things (IoT) foresees a world of interconnected people with every physical object in a seamless manner. The security related aspects for the IoT world are still an open field of discussion and research.
Eman Elemam   +3 more
doaj  

Achieving Both Valid and Secure Logistic Regression Analysis on Aggregated Data from Different Private Sources

open access: yesThe Journal of Privacy and Confidentiality, 2012
Preserving the privacy of individual databases when carrying out statistical calculations has a relatively long history in statistics and had been the focus of much recent attention in machine learning.
Yuval Nardi   +2 more
doaj   +1 more source

Ridra: A Rigorous Decentralized Randomized Authentication in VANETs

open access: yesIEEE Access, 2018
Ensuring the security and privacy of vehicle is one of the critical requirements for the safety and reliability of vehicular ad hoc networks. A variety of (conditional) anonymous authentication schemes, including group/ring signatures, pseudo-identity ...
Cong Sun   +4 more
doaj   +1 more source

Measurement-Device Independency Analysis of Continuous-Variable Quantum Digital Signature

open access: yesEntropy, 2018
With the practical implementation of continuous-variable quantum cryptographic protocols, security problems resulting from measurement-device loopholes are being given increasing attention. At present, research on measurement-device independency analysis
Tao Shang, Ke Li, Jianwei Liu
doaj   +1 more source

A Review of Lightweight IoT Authentication Protocols From the Perspective of Security Requirements, Computation, Communication, and Hardware Costs

open access: yesIEEE Access
The Internet of Things (IoT) is a broad area that encompasses various use cases. Numerous use cases include various IoT devices, which necessitate various cryptographic methods to provide distinct security requirements.
Isil Cetintav, Mehmet Tahir Sandikkaya
doaj   +1 more source

Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms

open access: yesScientific Reports
This research introduces a novel hybrid cryptographic framework that combines traditional cryptographic protocols with advanced methodologies, specifically Wasserstein Generative Adversarial Networks with Gradient Penalty (WGAN-GP) and Genetic Algorithms
Purushottam Singh   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy