Results 31 to 40 of about 334,436 (368)

Fault-Tolerant Data Aggregation Scheme Supporting Fine-Grained Linear Operation in Smart Grid

open access: yesIEEE Access, 2023
Smart grid is a combination of traditional power system engineering and information and communication technology. Smart grid provides users with convenient services through real-time data updates.
Zichao Song   +5 more
doaj   +1 more source

A semantic‐based method for analysing unknown malicious behaviours via hyper‐spherical variational auto‐encoders

open access: yesIET Information Security, 2023
In the User and Entity Behaviour Analytics (UEBA), unknown malicious behaviours are often difficult to be automatically detected due to the lack of labelled data.
Yi‐feng Wang, Yuan‐bo Guo, Chen Fang
doaj   +1 more source

Phase-Matching Quantum Key Distribution with Discrete Phase Randomization

open access: yesEntropy, 2021
The twin-field quantum key distribution (TF-QKD) protocol and its variations have been proposed to overcome the linear Pirandola–Laurenza–Ottaviani–Banchi (PLOB) bound.
Xiaoxu Zhang   +6 more
doaj   +1 more source

Model Learning and Model Checking of IPSec Implementations for Internet of Things

open access: yesIEEE Access, 2019
With the development of Internet of Things (IoT) technology, the demand for secure communication by smart devices has dramatically increased, and the security of the IoT protocol has become the focus of cyberspace.
Jiaxing Guo   +3 more
doaj   +1 more source

Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness

open access: yesEntropy, 2022
Sending-or-not sending twin-field quantum key distribution (SNS TF-QKD) has the advantage of tolerating large amounts of misalignment errors, and its key rate can exceed the linear bound of repeaterless quantum key distribution.
Xiao-Lei Jiang   +5 more
doaj   +1 more source

A New Era of Cryptography : Quantum Cryptography [PDF]

open access: yesInternational Journal on Cryptography and Information Security, 2016
ABSTRACT Security is the first priority in today digital world for secure communication between sender and receiver. Various Cryptography techniques are developed time to time for secure communication. Quantum Cryptography is one of the latest and advanced cryptography technique, it is different from all other cryptography technique and more secure ...
openaire   +2 more sources

Design and implementation of an energy-efficient Keccak algorithm ASIC

open access: yesDianzi Jishu Yingyong, 2019
The complete hardware circuit of Keccak algorithm which can support the four modes of SHA3 is designed and implemented. Based on the detailed analysis of the sponge functions and Keccak algorithm, the modular idea is used to divide the circuit structure ...
Tuo Zhao, Chen Tao, Li Wei, Nan Longmei
doaj   +1 more source

Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography [PDF]

open access: yes, 2017
Several recent works have proposed and implemented cryptography as a means to preserve privacy and security of patients health data. Nevertheless, the weakest point of electronic health record (EHR) systems that relied on these cryptographic schemes is ...
Emuoyibofarhe, Justice   +2 more
core   +2 more sources

Applied Cryptography

open access: yes, 2020
Cryptography is an indispensable tool for protecting information in computer systems. During this course I learnt how to reason about the security of cryptographic constructions and how to apply this knowledge to real-world applications.
Raju Singh
semanticscholar   +1 more source

Mathematical methods in solutions of the problems from the Third International Students' Olympiad in Cryptography [PDF]

open access: yes, 2017
The mathematical problems and their solutions of the Third International Students' Olympiad in Cryptography NSUCRYPTO'2016 are presented. We consider mathematical problems related to the construction of algebraic immune vectorial Boolean functions and ...
Agievich, S.   +7 more
core   +3 more sources

Home - About - Disclaimer - Privacy