Results 41 to 50 of about 235,449 (333)
Characterisations of Ideal Threshold Schemes [PDF]
We characterise ideal threshold schemes from different approaches. Since the characteristic properties are independent to particular descriptions of threshold schemes all ideal threshold schemes can be examined by new points of view and new results on ...
Josef Pieprzyk, Xian-Mo Zhang
doaj +1 more source
A Lightweight and Privacy-Preserving Authentication Protocol for Healthcare in an IoT Environment
In Internet of Things (IoT)-based healthcare, sensor nodes are deployed to detect the patient’s physiological data in a wireless sensor network. In order to prevent unwarranted users from accessing the sensor network to obtain patients’ data, designing ...
Qingyun Xie, Zixuan Ding, Qi Xie
doaj +1 more source
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other ...
H., Akshata Shenoy+2 more
core +1 more source
The relationship between two flavors of oblivious transfer at the quantum level [PDF]
Though all-or-nothing oblivious transfer and one-out-of-two oblivious transfer are equivalent in classical cryptography, we here show that due to the nature of quantum cryptography, a protocol built upon secure quantum all-or-nothing oblivious transfer ...
C. Crepeau+5 more
core +2 more sources
Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP
In this paper, we present an improved differential-linear cryptanalysis of the ChaCha stream cipher. Our main contributions are new differential-linear distinguishers that we were able to build thanks to the following improvements: a) we considered a ...
Emanuele Bellini+4 more
doaj +1 more source
Terahertz Quantum Cryptography [PDF]
REVTeX. 14 pages. 5 figures.
Carlo Ottaviani+6 more
openaire +6 more sources
A Cross-Trusted Authority Authentication Protocol for Internet of Vehicles Based on Blockchain
With the increasing number of vehicles connected to the Internet of Vehicles (IoV), to accommodate the evolving needs and patterns of new vehicles, passengers, and drivers, traditional single Trusted Authority (TA) authentication model may no longer be ...
Qi Xie+3 more
doaj +1 more source
Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions [PDF]
With the ever-growing concern for internet security, the field of quantum cryptography emerges as a promising solution for enhancing the security of networking systems. In this paper, 20 notable papers from leading conferences and journals are reviewed and categorized based on their focus on various aspects of quantum cryptography, including key ...
arxiv
Taurine promotes glucagon‐like peptide‐1 secretion in enteroendocrine L cells
Taurine, a sulfur‐containing amino acid, is likely taken up by enteroendocrine L cells via the taurine transporter. This process increases the levels of cytosolic ATP. The increase in intracellular Ca2+ concentrations and glucagon‐like peptide‐1 secretion through membrane depolarization is caused by the closure of ATP‐sensitive potassium channels ...
Yuri Osuga+6 more
wiley +1 more source
Cloud computing is the emerging trend in today's world. Cloud computing is not a separate technology, it is platform which provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is that we hire everything from a third party or store our important data's in a third parties place .Here ...
Padmapriya I, Ragini H
openaire +2 more sources