Results 131 to 140 of about 96,237 (302)

On Cryptographic Information Security in Cloud Infrastructures: PKI and IBE Methods

open access: yesБезопасность информационных технологий, 2014
The application of cryptographic security methods in cloud infrastructure information security is analyzed. The cryptographic problems in cloudy infrastructures are chosen; the appropriate protocols are investigated; the appropriate mathematical problems
Konstantin Grigorevich Kogos   +2 more
doaj  

Point Intervention: Improving ACVP Test Vector Generation Through Human Assisted Fuzzing [PDF]

open access: yesarXiv
Automated Cryptographic Validation Protocol (ACVP) is an existing protocol that is used to validate a software or hardware cryptographic module automatically. In this work, we present a system providing the method and tools to produce well-covering tests in ACVP format for cryptographic libraries.
arxiv  

An Analysis of the CAVES Attestation Protocol using CPSA [PDF]

open access: yesarXiv, 2012
This paper describes the CAVES attestation protocol and presents a tool-supported analysis showing that the runs of the protocol achieve stated goals. The goals are stated formally by annotating the protocol with logical formulas using the rely-guarantee method. The protocol analysis tool used is the Cryptographic Protocol Shape Analyzer.
arxiv  

Secure Composition of Cryptographic Protocols [PDF]

open access: yes, 2011
General positive results for secure computation were obtained more than two decades ago. These results were for the setting where each protocol execution is done in isolation. With the proliferation of the network setting (and especially the internet), an ambitious effort to generalize these results and obtain concurrently secure protocols was started.
openaire   +3 more sources

Deep Ocean: A blockchain-agnostic dark pool protocol [PDF]

open access: yesarXiv, 2019
We introduce a new cryptographic protocol, called Deep Ocean, that implements a blockchain-agnostic dark pool for cryptocurrencies. Deep Ocean is a layer-two protocol, meaning that it can work with any two cryptocurrencies, as long as there exists an underlying settlement mechanism, for example performing atomic swaps.
arxiv  

Simulatable security for quantum protocols

open access: yes, 2004
The notion of simulatable security (reactive simulatability, universal composability) is a powerful tool for allowing the modular design of cryptographic protocols (composition of protocols) and showing the security of a given protocol embedded in a ...
Unruh, Dominique
core  

Review on 6G communication and its architecture, technologies included, challenges, security challenges and requirements, applications, with respect to AI domain

open access: yesIET Quantum Communication, EarlyView.
This paper presents an overview of the various aspects of 6G communication architecture, focusing on its technologies, challenges, and applications within the domain of artificial intelligence (AI). The paper explores the evolving landscape of wireless communication, delving into the anticipated features and capabilities of 6G networks.
Pranita Bhide   +2 more
wiley   +1 more source

Measurement-Device Independency Analysis of Continuous-Variable Quantum Digital Signature

open access: yesEntropy, 2018
With the practical implementation of continuous-variable quantum cryptographic protocols, security problems resulting from measurement-device loopholes are being given increasing attention. At present, research on measurement-device independency analysis
Tao Shang, Ke Li, Jianwei Liu
doaj   +1 more source

Secure quantum cryptographic network based on quantum key distribution [PDF]

open access: yesarXiv, 2004
We present a protocol for quantum cryptographic network consisting of a quantum network center and many users, in which any pair of parties with members chosen from the whole users on request can secure a quantum key distribution by help of the center. The protocol is based on the quantum authentication scheme given by Barnum et al. [Proc.
arxiv  

Home - About - Disclaimer - Privacy