Results 31 to 40 of about 1,926,564 (269)

Intelligent design of network multimedia using big data and virtual Artificial Intelligence technology

open access: yesIET Networks, EarlyView., 2023
The topic discussed was the intelligent design of network multimedia using BD and virtual AI technology. First of all, the authors gave a brief overview of its relevant research background, and then comprehensively analysed the advantages and disadvantages of previous scholars' research on network multimedia.
Xin Zhang
wiley   +1 more source

Public Key Protocols over Skew Dihedral Group Rings

open access: yesMathematics, 2022
This paper introduces skew dihedral group rings and their applications for public-key cryptography. We present a specific skew group ring that is the underlying algebraic platform for our cryptographic constructions.
Javier de la Cruz   +2 more
doaj   +1 more source

Anonymous credit cards and their collusion analysis [PDF]

open access: yes, 1996
Communications networks are traditionally used to bring information together. They can also be used to keep information apart in order to protect personal privacy.
Low, Steven H.   +2 more
core   +3 more sources

Security of Quantum Key Distribution with Entangled Qutrits [PDF]

open access: yes, 2002
The study of quantum cryptography and quantum non-locality have traditionnally been based on two-level quantum systems (qubits). In this paper we consider a generalisation of Ekert's cryptographic protocol [Ekert] where qubits are replaced by qutrits ...
Cerf, Nicolas J.   +3 more
core   +2 more sources

An IND-CCA2 Secure Public Key Cryptographic Protocol using Suzuki 2-Group

open access: yes, 2017
Objectives: The public key cryptographic protocol is one of the most important fields in computer security. These new public key cryptographic protocols provide high security as compare to past results in the same field.
A. Meshram, C. Meshram, N. Khobragade
semanticscholar   +1 more source

Cryptographic Protocol Reverse Method Based on Information Entropy and Closed Frequent Sequences [PDF]

open access: yesJisuanji kexue
Unknown cryptographic protocols are widely used for the secure transmission of sensitive information,and reversing cryptographic protocol is of great significance to both attackers and defenders.In order to efficiently reverse complex cryptographic ...
LIANG Chen, HONG Zheng, WU Lifa, JI Qingbing
doaj   +1 more source

Monitoring approach for online security of cryptographic protocol

open access: yesTongxin xuebao, 2016
Previous methods can not detect the low-interaction attacks of protocol logic.A cryptographic protocol online monitoring approach named CPOMA was presented.An ontology framework of cryptographic protocol features was constructed for the unified ...
Yu-na ZHU   +5 more
doaj   +2 more sources

CAPSL and MuCAPSL

open access: yesJournal of Telecommunications and Information Technology, 2002
Secure communication generally begins with a~connection establishment phase in which messages are exchanged by client and server protocol software to generate, share, and use secret data or keys. This message exchange is referred to as an authentication
Jonathan K. Millen, Grit Denker
doaj   +1 more source

Secure quantum channels with correlated twin laser beams

open access: yes, 2004
This work is the development and analysis of the recently proposed quantum cryptographic protocol, based on the use of the two-mode coherently correlated states. The protocol is supplied with the cryptographic control procedures.
A. Ekert   +10 more
core   +1 more source

Using of small-scale quantum computers in cryptography with many-qubit entangled states

open access: yes, 2004
We propose a new cryptographic protocol. It is suggested to encode information in ordinary binary form into many-qubit entangled states with the help of a quantum computer. A state of qubits (realized, e.g., with photons) is transmitted through a quantum
A. Ekert   +16 more
core   +1 more source

Home - About - Disclaimer - Privacy