Results 101 to 110 of about 63,614 (274)

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

The inductive approach to verifying cryptographic protocols [PDF]

open access: yesJournal of Computer Security, 1998
Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinite-state systems. Proofs are generated using Isabelle/HOL. The human effort required to analyze a protocol can be as little as a week or two, yielding a proof script that ...
openaire   +3 more sources

RDHNet: Reversible Data Hiding Method for Securing Colour Images Using AlexNet and Watershed Transform in a Fusion Domain

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Medical images play a crucial role in diagnosis, treatment procedures and overall healthcare. Nevertheless, they also pose substantial risks to patient confidentiality and safety. Safeguarding the confidentiality of patients' data has become an urgent and practical concern.
Mohamed Meselhy Eltoukhy   +3 more
wiley   +1 more source

Simulatable security for quantum protocols

open access: yes, 2004
The notion of simulatable security (reactive simulatability, universal composability) is a powerful tool for allowing the modular design of cryptographic protocols (composition of protocols) and showing the security of a given protocol embedded in a ...
Unruh, Dominique
core  

Coin Tossing is Strictly Weaker Than Bit Commitment

open access: yes, 1999
We define cryptographic assumptions applicable to two mistrustful parties who each control two or more separate secure sites between which special relativity guarantees a time lapse in communication. We show that, under these assumptions, unconditionally
A. Kent   +9 more
core   +1 more source

Market Reactions to Cryptocurrency Regulation: Risk, Return and the Role of Enforcement Quality

open access: yesBritish Journal of Management, EarlyView.
Abstract We explore the risk–return trade‐off in international regulation of cryptocurrency markets using a unique sample of regulations implemented between July 2018 and April 2023. Various regulation types have reduced risk in cryptocurrency markets while having differential impacts on raw and risk‐adjusted returns.
Douglas Cumming   +2 more
wiley   +1 more source

A Generic Security Proof for Quantum Key Distribution

open access: yes, 2004
Quantum key distribution allows two parties, traditionally known as Alice and Bob, to establish a secure random cryptographic key if, firstly, they have access to a quantum communication channel, and secondly, they can exchange classical public messages ...
Christandl, Matthias   +2 more
core  

Verification of STAR-Vote and Evaluation of FDR and ProVerif

open access: yes, 2017
We present the first automated privacy analysis of STAR-Vote, a real world voting system design with sophisticated "end-to-end" cryptography, using FDR and ProVerif. We also evaluate the effectiveness of these tools.
Moran, Murat, Wallach, Dan S.
core   +1 more source

A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley   +1 more source

On Cryptographic Information Security in Cloud Infrastructures: PKI and IBE Methods

open access: yesБезопасность информационных технологий, 2014
The application of cryptographic security methods in cloud infrastructure information security is analyzed. The cryptographic problems in cloudy infrastructures are chosen; the appropriate protocols are investigated; the appropriate mathematical problems
Konstantin Grigorevich Kogos   +2 more
doaj  

Home - About - Disclaimer - Privacy