Results 31 to 40 of about 1,901,421 (313)

A Cryptographic Moving-Knife Cake-Cutting Protocol [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2012
This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players
Yoshifumi Manabe, Tatsuaki Okamoto
doaj   +1 more source

Security Threats and Cryptographic Protocols for Medical Wearables

open access: yesMathematics, 2022
In the past few years, the use of several medical devices is increasing. This paper will pay attention to a device developed to get measures of the temperature of diabetic foot.
Luis Hernández-Álvarez   +3 more
semanticscholar   +1 more source

Public Key Protocols over Skew Dihedral Group Rings

open access: yesMathematics, 2022
This paper introduces skew dihedral group rings and their applications for public-key cryptography. We present a specific skew group ring that is the underlying algebraic platform for our cryptographic constructions.
Javier de la Cruz   +2 more
doaj   +1 more source

How much security does Y-00 protocol provide us ? [PDF]

open access: yes, 2003
New quantum cryptography, often called Y-00 protocol, has much higher performance than the conventional quantum cryptographies. It seems that the conventional quantum cryptographic attacks are inefficient at Y-00 protocol as its security is based on the ...
Hasegawa, Toshio   +4 more
core   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Intelligent design of network multimedia using big data and virtual Artificial Intelligence technology

open access: yesIET Networks, EarlyView., 2023
The topic discussed was the intelligent design of network multimedia using BD and virtual AI technology. First of all, the authors gave a brief overview of its relevant research background, and then comprehensively analysed the advantages and disadvantages of previous scholars' research on network multimedia.
Xin Zhang
wiley   +1 more source

A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol

open access: yesEuropean Symposium on Security and Privacy, 2019
WireGuard is a free and open source Virtual Private Network (VPN) that aims to replace IPsec and OpenVPN. It is based on a new cryptographic protocol derived from the Noise Protocol Framework.
Benjamin Lipp, B. Blanchet, K. Bhargavan
semanticscholar   +1 more source

Security of Quantum Key Distribution with Entangled Qutrits [PDF]

open access: yes, 2002
The study of quantum cryptography and quantum non-locality have traditionnally been based on two-level quantum systems (qubits). In this paper we consider a generalisation of Ekert's cryptographic protocol [Ekert] where qubits are replaced by qutrits ...
Cerf, Nicolas J.   +3 more
core   +2 more sources

Distributed Cryptographic Protocols

open access: yes, 2023
[EN] Trust is the base of modern societies. However, trust is difficult to achieve and can be exploited easily with devastating results. In this thesis, we explore the use of distributed cryptographic protocols to build reliable systems where trust can be replaced by cryptographic and mathematical guarantees.
openaire   +2 more sources

Cryptographic Protocol Reverse Method Based on Information Entropy and Closed Frequent Sequences [PDF]

open access: yesJisuanji kexue
Unknown cryptographic protocols are widely used for the secure transmission of sensitive information,and reversing cryptographic protocol is of great significance to both attackers and defenders.In order to efficiently reverse complex cryptographic ...
LIANG Chen, HONG Zheng, WU Lifa, JI Qingbing
doaj   +1 more source

Home - About - Disclaimer - Privacy