Results 71 to 80 of about 1,926,564 (269)

Medical Data as a Key Asset in the Digital Health Era: A Framework for Challenges and Strategies

open access: yesiMetaMed, EarlyView.
By conducting case studies and comparative analysis from a global perspective, this study develops the practical framework of Medical Data Element Ecosystem (MDEE)—one that facilitates MDEE construction by guiding actions, informing policy‐making, and enabling stakeholder engagement.
Jian Wang   +10 more
wiley   +1 more source

LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory

open access: yesIET Information Security
The π-calculus is a basic theory of mobile communication based on the notion of interaction, which, is aimed at analyzing and modeling the behaviors of communication processes in communicating and mobile systems, and is widely applied to the security ...
Fusheng Wu   +3 more
doaj   +1 more source

On the cryptographic properties of “Limonnik-3” AKE scheme

open access: yesБезопасность информационных технологий, 2019
We study the “Limonnik-3” authenticated key exchange protocol which is a part of Standardization recommendations R 1323565.1.004-2017 “Authenticated key agreement schemes based on public keys”, officially adopted in Russia in 2017, alongside with the ...
Sergey V. Grebnev
doaj   +1 more source

Cylindrical Vector Beam Multiplexing based on All‐Dielectric Fiber Meta‐Tips Enabling High‐Capacity Bidirectional Optical Communication

open access: yesLaser &Photonics Reviews, EarlyView.
Cylindrical vector beam (CVB) multiplexing offers a viable solution to channel capacity, integration, and unidirectional transmission challenges in fiber‐rich sixth‐generation backbone networks. An all‐dielectric fiber meta‐tip‐enabled CVB multiplexing system is proposed and demonstrated, providing high‐capacity, bidirectional optical interconnects and
Jinke Li   +3 more
wiley   +1 more source

Model checking of trusted cryptographic module

open access: yesTongxin xuebao, 2010
The formal security analysis was given for the trusted cryptographic module according to the specification of the trusted cryptographic module using model checking tools. The flaws in the AP protocol were pointed and the solution was given.
CHEN Xiao-feng, FENG Deng-guo
doaj   +2 more sources

A secure mutual authentication procedure, generate the key fiscal basis, and fiscal data protection

open access: yesБезопасность информационных технологий, 2018
The paper describes cryptographic transformation for mutual authentication and creation of the fiscal sign key. This transformation based on using block encryption cipher named «Kuznetchik», described in the national standard of the Russian Federation ...
Igor Y. Zhukov, Oleg N. Murashov
doaj   +1 more source

Agile and Versatile Quantum Communication: Signatures and Secrets

open access: yesPhysical Review X, 2021
Agile cryptography allows for a resource-efficient swap of a cryptographic core in case the security of an underlying classical cryptographic algorithm becomes compromised.
Stefan Richter   +9 more
doaj   +1 more source

Efficient Robust Spontaneous Parametric Down‐Conversion via Detuning Modulated Composite Segments Designs

open access: yesLaser &Photonics Reviews, EarlyView.
Detuning modulated composite segmentation (DMCS) enables robust spontaneous parametric down‐conversion with sevenfold improved temperature stability compared to conventional designs, opening new possibilities for stable quantum photon sources. ABSTRACT Spontaneous parametric down conversion (SPDC) holds a pivotal role in quantum physics, facilitating ...
Muhammad Erew   +5 more
wiley   +1 more source

Authentication and common key generation cryptographic protocol for vehicle tachographs

open access: yesБезопасность информационных технологий, 2017
We present a public key generation protocol. The key is used for subscriber authentication in tachographs installed on vehicles in order to provide traffic safety. The protocol is based on the well-known Russian cryptographic algorithms.
Victor S. Gorbatov   +2 more
doaj   +1 more source

Cryptographic security of quantum key distribution [PDF]

open access: yes, 2014
This work is intended as an introduction to cryptographic security and a motivation for the widely used Quantum Key Distribution (QKD) security definition.
Portmann, Christopher, Renner, Renato
core  

Home - About - Disclaimer - Privacy