Results 51 to 60 of about 96,237 (302)

Confidential machine learning on untrusted platforms: a survey

open access: yesCybersecurity, 2021
With the ever-growing data and the need for developing powerful machine learning models, data owners increasingly depend on various untrusted platforms (e.g., public clouds, edges, and machine learning service providers) for scalable processing or ...
Sharma Sagar, Chen Keke
doaj   +1 more source

Quantum and classical oblivious transfer: A comparative analysis

open access: yesIET Quantum Communication, 2021
Secure multiparty computation has the potential to be a disruptive technique in the realm of data analysis and computation. It enables several parties to compute virtually any function while preserving the privacy of their inputs.
Manuel B. Santos   +2 more
doaj   +1 more source

A Formal Analysis Method with Reasoning for Cryptographic Protocols and Its Supporting Tools [PDF]

open access: yes, 2016
埼玉大学博士(工学)vii, 52 p.Many cryptographic protocols have been proposed to securely send and receive information among agents in unsecured networks for various purposes.
ワガツマ, カズノリ   +1 more
core   +1 more source

A trust‐based mechanism for drones in smart cities

open access: yesIET Smart Cities, Volume 4, Issue 4, Page 255-264, December 2022., 2022
Abstract Smart cities equipped with intelligent devices can enhance the lifestyle and quality of humans by automatically and collaboratively acting as a sustainable resource to the ecosystem. In addition, the technological advancement can be further empowered by interconnecting various types of technologies, such as IoT, Artificial Intelligence, drones
Geetanjali Rathee   +3 more
wiley   +1 more source

CAPSL and MuCAPSL

open access: yesJournal of Telecommunications and Information Technology, 2002
Secure communication generally begins with a~connection establishment phase in which messages are exchanged by client and server protocol software to generate, share, and use secret data or keys. This message exchange is referred to as an authentication
Jonathan K. Millen, Grit Denker
doaj   +1 more source

A Security Verification Framework of Cryptographic Protocols Using Machine Learning [PDF]

open access: yesarXiv, 2023
We propose a security verification framework for cryptographic protocols using machine learning. In recent years, as cryptographic protocols have become more complex, research on automatic verification techniques has been focused on. The main technique is formal verification. However, the formal verification has two problems: it requires a large amount
arxiv  

Improving Formal Analysis Method with Reasoning for Cryptographic Protocols [PDF]

open access: yes, 2019
埼玉大学博士(学術)vii, 61 p.Cryptographic protocols are protocols which perform some security-related functions using cryptography. Flaws of cryptographic protocols will bring serious security problems to the cyberspace application, and even cause the ...
エン, セイシン, 閻, 靖晨
core   +1 more source

‘Lex Cryptographi(c)a,’ ‘Cloud Crypto Land’ or What? – Blockchain Technology on the Legal Hype Cycle

open access: yesThe Modern Law Review, Volume 86, Issue 1, Page 31-66, January 2023., 2023
Based on the reception of DLT/blockchain, this article argues that legal discourse is subject to hype cycle dynamics. Thinking in hype cycle categories provides a structured way for analysing the legal implications of a particular innovation. This critical engagement with enthusiasts, sceptics and pragmatists through the different stages may help to ...
Michael Anderson Schillig
wiley   +1 more source

eGMT-Fuzz: Format-Aware Deep Fuzzing of Cryptographic Protocols [PDF]

open access: yesProceedings of the XXth Conference of Open Innovations Association FRUCT
Fuzzing has established itself as an everyday tool in the toolbox of the security-minded software developer. Fuzzers have proven especially effective in discovering vulnerabilities that are rarely triggered during regular program execution.
Angel Lomeli, Arto Niemi
doaj   +1 more source

Vulnerability of blockchain technologies to quantum attacks

open access: yesArray, 2021
Quantum computation represents a threat to many cryptographic protocols in operation today. It has been estimated that by 2035, there will exist a quantum computer capable of breaking the vital cryptographic scheme RSA2048.
Joseph J. Kearney   +1 more
doaj  

Home - About - Disclaimer - Privacy