Results 91 to 100 of about 96,237 (302)
Cryptographic mechanisms for secure interaction of control and measuring devices
The paper describes the key features of the cryptographic protocol providing secure interaction between control and measuring devices. The hierarchical structure underlying this protocol and the relationship between the transport and session levels of ...
Alexey Yu. Nesterenko+1 more
doaj +1 more source
On formal verification of arithmetic-based cryptographic primitives
Cryptographic primitives are fundamental for information security: they are used as basic components for cryptographic protocols or public-key cryptosystems.
A.C. Yao+11 more
core +1 more source
Blockchain and NoSQL: Enhancing Throughput via a Deep Learning‐Based Hybrid Architecture
ABSTRACT Any data structure used to store information can be considered a database. Blockchain technology, at its core, is no more than a ledger to store information about transactions. In recent years, such technology has gained immense popularity in a wide range of applications.
Longo Antonello+4 more
wiley +1 more source
Commitment and Oblivious Transfer in the Bounded Storage Model with Errors [PDF]
The bounded storage model restricts the memory of an adversary in a cryptographic protocol, rather than restricting its computational power, making information theoretically secure protocols feasible.
Dowsley, Rafael+2 more
core +2 more sources
Specifying a Cryptographical Protocol in Lustre and SCADE [PDF]
In Proceedings MARS 2020, arXiv:2004.12403.
openaire +6 more sources
Abstracting cryptographic protocols with tree automata [PDF]
AbstractCryptographic protocols have so far been analyzed for the most part by means of testing (which does not yield proofs of secrecy) and theorem proving (costly). We propose a new approach, based on abstract interpretation and using regular tree languages. The abstraction we use seems fine-grained enough to be able to certify some protocols.
David Monniaux, David Monniaux
openaire +3 more sources
Beyond traditional orthopaedic data analysis: AI, multimodal models and continuous monitoring
Abstract Multimodal artificial intelligence (AI) has the potential to revolutionise healthcare by enabling the simultaneous processing and integration of various data types, including medical imaging, electronic health records, genomic information and real‐time data.
Felix C. Oettl+7 more
wiley +1 more source
This comment is presented to identify the drawbacks in a recently demonstrated scheme by Maitra et al., SAS‐Cloud: doi:10.1049/iet-net.2019.0004, which adopted an ElGamal cryptosystem‐based technique for biometric authentication in cloud‐based IoT ...
Azeem Irshad, Shehzad Ashraf Chaudhry
doaj +1 more source
Cryptographic security of quantum key distribution [PDF]
This work is intended as an introduction to cryptographic security and a motivation for the widely used Quantum Key Distribution (QKD) security definition.
Portmann, Christopher, Renner, Renato
core
Statistical Complexity of Quantum Learning
The statistical performance of quantum learning is investigated as a function of the number of training data N$N$, and of the number of copies available for each quantum state in the training and testing data sets, respectively S$S$ and V$V$. Indeed, the biggest difference in quantum learning comes from the destructive nature of quantum measurements ...
Leonardo Banchi+3 more
wiley +1 more source