On the properties of cryptographic protocols and the weaknesses of the BAN-like logics [PDF]
Shouhuai Xu, Gendu Zhang, Hong Zhu
openalex +1 more source
M‐SADR: Mobile Self Adaptive Data Rate for Enhanced LoRa End‐Device Connectivity on the Move
The proposed M‐SADR method targets mobile LoRa end‐devices and achieves better performance, with a 2.4% improvement in packet delivery ratio and a 5.7% reduction in power consumption per successfully delivered packet. ABSTRACT Mobility is a critical aspect of the Internet of Things, reflecting the diverse and dynamic nature of potential applications ...
Vasileios Moysiadis+6 more
wiley +1 more source
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this characterization corresponds closely
Devadas, Srinivas+4 more
core +1 more source
A Comparative Analysis on the Services Offered by Amazon Web Services and Microsoft Azure
ABSTRACT Different small or large‐scale enterprises came to the conclusion that moving data to the cloud is more convenient. In recent decades, AWS and Azure have tried their best to provide comparatively affordable and instant solutions. Both cloud platforms are extensive to understand, so it is difficult for users to make the right choice because of ...
Sara Hameed+4 more
wiley +1 more source
A Real-Time Performance Analysis Model for Cryptographic Protocols [PDF]
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of sensitive data.
Amos Olagunju, Jake Soenneker
doaj
Security and Composition of Multiparty Cryptographic Protocols [PDF]
Ran Canetti
openalex +1 more source
Automated Risk‐Based Cryptoperiod Calculation in ICSs: Analytical Framework and Software Tool
ABSTRACT Internal network and system reconnaissance is one of the first crucial stages of most cyber attacks, though it plays an especially important role in attacks on complex industrial control systems (ICSs) that span both IT and OT environments. Frequently, besides device enumeration and scanning, a malicious ICS reconnaissance campaign will also ...
Gabriele Cianfarani+2 more
wiley +1 more source
Multi-language oriented automatic realization method for cryptographic protocols
A multi-objective-language-oriented automatic code generation scheme for security protocols was put forward.First,based on XML,a description method for security protocols was designed.Second,a graphic user interface(GUI)was developed,through which the ...
Xing-hua LI+3 more
doaj +2 more sources
Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol [PDF]
Devang Naik+4 more
openalex +1 more source
Blockchain‐Based Federated Learning Methodologies in Smart Environments for Drone Technology
High‐security transactions are stored in a chain of blocks using blockchain technology. Security and privacy concerns may be addressed by using blockchain technology. Federated learning is a paradigm for increasing data mining accuracy and precision by ensuring data privacy and security for both internet of things (IoT) devices and users in smart ...
Mukkoti Maruthi Venkata Chalapathi+6 more
wiley +1 more source