Results 91 to 100 of about 96,237 (302)

Cryptographic mechanisms for secure interaction of control and measuring devices

open access: yesБезопасность информационных технологий, 2020
The paper describes the key features of the cryptographic protocol providing secure interaction between control and measuring devices. The hierarchical structure underlying this protocol and the relationship between the transport and session levels of ...
Alexey Yu. Nesterenko   +1 more
doaj   +1 more source

On formal verification of arithmetic-based cryptographic primitives

open access: yes, 2009
Cryptographic primitives are fundamental for information security: they are used as basic components for cryptographic protocols or public-key cryptosystems.
A.C. Yao   +11 more
core   +1 more source

Blockchain and NoSQL: Enhancing Throughput via a Deep Learning‐Based Hybrid Architecture

open access: yesInternet Technology Letters, EarlyView.
ABSTRACT Any data structure used to store information can be considered a database. Blockchain technology, at its core, is no more than a ledger to store information about transactions. In recent years, such technology has gained immense popularity in a wide range of applications.
Longo Antonello   +4 more
wiley   +1 more source

Commitment and Oblivious Transfer in the Bounded Storage Model with Errors [PDF]

open access: yes, 2017
The bounded storage model restricts the memory of an adversary in a cryptographic protocol, rather than restricting its computational power, making information theoretically secure protocols feasible.
Dowsley, Rafael   +2 more
core   +2 more sources

Specifying a Cryptographical Protocol in Lustre and SCADE [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2020
In Proceedings MARS 2020, arXiv:2004.12403.
openaire   +6 more sources

Abstracting cryptographic protocols with tree automata [PDF]

open access: yesScience of Computer Programming, 1999
AbstractCryptographic protocols have so far been analyzed for the most part by means of testing (which does not yield proofs of secrecy) and theorem proving (costly). We propose a new approach, based on abstract interpretation and using regular tree languages. The abstraction we use seems fine-grained enough to be able to certify some protocols.
David Monniaux, David Monniaux
openaire   +3 more sources

Beyond traditional orthopaedic data analysis: AI, multimodal models and continuous monitoring

open access: yesKnee Surgery, Sports Traumatology, Arthroscopy, EarlyView.
Abstract Multimodal artificial intelligence (AI) has the potential to revolutionise healthcare by enabling the simultaneous processing and integration of various data types, including medical imaging, electronic health records, genomic information and real‐time data.
Felix C. Oettl   +7 more
wiley   +1 more source

Comment on ‘ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications’

open access: yesIET Networks, 2021
This comment is presented to identify the drawbacks in a recently demonstrated scheme by Maitra et al., SAS‐Cloud: doi:10.1049/iet-net.2019.0004, which adopted an ElGamal cryptosystem‐based technique for biometric authentication in cloud‐based IoT ...
Azeem Irshad, Shehzad Ashraf Chaudhry
doaj   +1 more source

Cryptographic security of quantum key distribution [PDF]

open access: yes, 2014
This work is intended as an introduction to cryptographic security and a motivation for the widely used Quantum Key Distribution (QKD) security definition.
Portmann, Christopher, Renner, Renato
core  

Statistical Complexity of Quantum Learning

open access: yesAdvanced Quantum Technologies, EarlyView.
The statistical performance of quantum learning is investigated as a function of the number of training data N$N$, and of the number of copies available for each quantum state in the training and testing data sets, respectively S$S$ and V$V$. Indeed, the biggest difference in quantum learning comes from the destructive nature of quantum measurements ...
Leonardo Banchi   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy