Results 41 to 50 of about 96,237 (302)

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

LpiCT: A logic security analysis framework for protocols [PDF]

open access: yesarXiv, 2023
The pi calculus is a basic theory of mobile communication based on the notion of interaction, which, aimed at analyzing and modelling the behaviors of communication process in communicating and mobile systems, is widely applied to the security analysis of cryptographic protocol's design and implementation.
arxiv  

Fragment-synthesis-based multiparty cryptographic key distribution over a public network [PDF]

open access: yesOptics and Lasers in Engineering, 155, 107067 (2022), 2020
A secure optical communication requires both high transmission efficiency and high authentication performance, while existing cryptographic key distribution protocols based on ghost imaging have many shortcomings. Here, based on computational ghost imaging, we propose an interactive protocol that enables multi-party cryptographic key distribution over ...
arxiv   +1 more source

Multiparty Quantum Cryptographic Protocol

open access: yesChinese Physics Letters, 2008
12 pages, 1 .eps figure, 3 ...
Muhammad Ramzan, M. K. Khan
openaire   +4 more sources

Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices

open access: yesIET Networks, Volume 12, Issue 1, Page 1-8, January 2023., 2023
Abstract In the era of the Internet of things (IoT), billions of electrical devices are connected to the Internet and communicate remotely with one another without any human intervention. IoT devices often do not enforce proper security measures; this raises serious privacy and security concerns.
Selvakumar Manickam, Shafiq Ul Rehman
wiley   +1 more source

LoET-E: A Refined Theory for Proving Security Properties of Cryptographic Protocols

open access: yesIEEE Access, 2019
Nowadays, more and more new cryptographic protocols are emerging, and the security analysis of emerging cryptographic protocols is increasingly important.
Jiawen Song   +4 more
doaj   +1 more source

Intelligent design of network multimedia using big data and virtual Artificial Intelligence technology

open access: yesIET Networks, EarlyView., 2023
The topic discussed was the intelligent design of network multimedia using BD and virtual AI technology. First of all, the authors gave a brief overview of its relevant research background, and then comprehensively analysed the advantages and disadvantages of previous scholars' research on network multimedia.
Xin Zhang
wiley   +1 more source

Key generation schemes for channel authentication in quantum key distribution protocol

open access: yesIET Quantum Communication, 2021
Quantum key distribution (QKD) systems enable secure key generation between two parties. Such systems require an authenticated classical channel for QKD protocols to work. Usually, the initial authentication key for this channel is pre‐shared.
Mikhail Borodin   +2 more
doaj   +1 more source

Quantum medical images processing foundations and applications

open access: yesIET Quantum Communication, Volume 3, Issue 4, Page 201-213, December 2022., 2022
Abstract Medical imaging is considered one of the most important areas within scientific imaging due to the rapid and ongoing development in computer‐aided medical image visualisation, advances in analysis approaches, and computer‐aided diagnosis.
Ahmed Elaraby
wiley   +1 more source

Analysis of Cryptographic Protocol by Dynamic Epistemic Logic

open access: yesIEEE Access, 2019
The security of the cryptographic protocols has always been important to ensure proper implementation of a protocol. To assure protocol security, a number of works for analysis and verification of cryptographic protocols have emerged in the literature ...
Xiaojuan Chen, Huiwen Deng
doaj   +1 more source

Home - About - Disclaimer - Privacy