Results 51 to 60 of about 96,237 (302)
Confidential machine learning on untrusted platforms: a survey
With the ever-growing data and the need for developing powerful machine learning models, data owners increasingly depend on various untrusted platforms (e.g., public clouds, edges, and machine learning service providers) for scalable processing or ...
Sharma Sagar, Chen Keke
doaj +1 more source
Quantum and classical oblivious transfer: A comparative analysis
Secure multiparty computation has the potential to be a disruptive technique in the realm of data analysis and computation. It enables several parties to compute virtually any function while preserving the privacy of their inputs.
Manuel B. Santos+2 more
doaj +1 more source
A Formal Analysis Method with Reasoning for Cryptographic Protocols and Its Supporting Tools [PDF]
埼玉大学博士(工学)vii, 52 p.Many cryptographic protocols have been proposed to securely send and receive information among agents in unsecured networks for various purposes.
ワガツマ, カズノリ+1 more
core +1 more source
A trust‐based mechanism for drones in smart cities
Abstract Smart cities equipped with intelligent devices can enhance the lifestyle and quality of humans by automatically and collaboratively acting as a sustainable resource to the ecosystem. In addition, the technological advancement can be further empowered by interconnecting various types of technologies, such as IoT, Artificial Intelligence, drones
Geetanjali Rathee+3 more
wiley +1 more source
Secure communication generally begins with a~connection establishment phase in which messages are exchanged by client and server protocol software to generate, share, and use secret data or keys. This message exchange is referred to as an authentication
Jonathan K. Millen, Grit Denker
doaj +1 more source
A Security Verification Framework of Cryptographic Protocols Using Machine Learning [PDF]
We propose a security verification framework for cryptographic protocols using machine learning. In recent years, as cryptographic protocols have become more complex, research on automatic verification techniques has been focused on. The main technique is formal verification. However, the formal verification has two problems: it requires a large amount
arxiv
Improving Formal Analysis Method with Reasoning for Cryptographic Protocols [PDF]
埼玉大学博士(学術)vii, 61 p.Cryptographic protocols are protocols which perform some security-related functions using cryptography. Flaws of cryptographic protocols will bring serious security problems to the cyberspace application, and even cause the ...
エン, セイシン, 閻, 靖晨
core +1 more source
‘Lex Cryptographi(c)a,’ ‘Cloud Crypto Land’ or What? – Blockchain Technology on the Legal Hype Cycle
Based on the reception of DLT/blockchain, this article argues that legal discourse is subject to hype cycle dynamics. Thinking in hype cycle categories provides a structured way for analysing the legal implications of a particular innovation. This critical engagement with enthusiasts, sceptics and pragmatists through the different stages may help to ...
Michael Anderson Schillig
wiley +1 more source
eGMT-Fuzz: Format-Aware Deep Fuzzing of Cryptographic Protocols [PDF]
Fuzzing has established itself as an everyday tool in the toolbox of the security-minded software developer. Fuzzers have proven especially effective in discovering vulnerabilities that are rarely triggered during regular program execution.
Angel Lomeli, Arto Niemi
doaj +1 more source
Vulnerability of blockchain technologies to quantum attacks
Quantum computation represents a threat to many cryptographic protocols in operation today. It has been estimated that by 2035, there will exist a quantum computer capable of breaking the vital cryptographic scheme RSA2048.
Joseph J. Kearney+1 more
doaj