Results 91 to 100 of about 7,729 (216)

Can NSEC5 be practical for DNSSEC deployments? [PDF]

open access: yes, 2017
NSEC5 is proposed modification to DNSSEC that simultaneously guarantees two security properties: (1) privacy against offline zone enumeration, and (2) integrity of zone contents, even if an adversary compromises the authoritative nameserver responsible ...
Goldberg, Sharon   +6 more
core  

Integrating identity-based cryptography in IMS service authentication

open access: yes, 2009
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed   +3 more
core   +6 more sources

CommTLC: An Alternative to Reduce the Attack Surface of HTLCs in Lightning Networks

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
The CommTLC scheme is secure against Fakey, Griefing and Wormhole attacks, as proven using the universal composability framework. It detects adversaries in these attacks within 112 ms for a payment path involving five users. Additionally, it outperforms recent privacy‐preserving PCN‐based solutions, MAPPCN‐OR and EAMHL+, in terms of communication and ...
Prerna Arote, Joy Kuri
wiley   +1 more source

A Subexponential Algorithm for Evaluating Large Degree Isogenies

open access: yes, 2010
An isogeny between elliptic curves is an algebraic morphism which is a group homomorphism. Many applications in cryptography require evaluating large degree isogenies between elliptic curves efficiently. For ordinary curves of the same endomorphism ring,
Jao, David, Soukharev, Vladimir
core   +1 more source

ShaEr: A Blockchain‐Based Framework for Secure Medical Data Sharing and Monetisation

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This paper presents a novel framework to enable secure medical data sharing and monetisation that utilises the inherent features of blockchain to establish a robust and transparent framework. It presents a reward policy aimed at incentivising data owners to share their data with third parties by ensuring that the real identity of the data owner remains
Md. Ahsan Habib   +1 more
wiley   +1 more source

Error analysis and detection procedures for elliptic curve cryptography

open access: yesAin Shams Engineering Journal, 2019
In this paper, a fault detection scheme is introduced with the ability to perform with increased protection and reliability of the Elliptic Curve Cryptography (ECC) in realistic environments at a competitive price point.
Naglaa F. Saudy   +2 more
doaj  

Lightweight Authentication Scheme for Resource‐Constrained Devices in IIoT

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
An authentication scheme leveraging elliptic curve cryptography (ECC) and lightweight cryptography was proposed. This scheme is designed to facilitate secure communication among IIoT devices while minimizing resource usage. ABSTRACT The industrial Internet of Things (IIoT) involves interconnected devices and sensors that exchange data in resource ...
Zhong Cao   +4 more
wiley   +1 more source

CIDER: Cyber‐Security in Industrial IoT Using Deep Learning and Ring Learning with Errors

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
This paper proposes secure measures using deep machine learning‐based intrusion detection and advanced encryption schemes based on lattice‐based cryptography on the cloud‐edge‐fog IIoT architecture. The evaluation experiments performed on the Ton_IoT dataset show that the deep learning models have a very good accuracy of around 92% for attack ...
Siu Ting Tsoi, Anish Jindal
wiley   +1 more source

Cryptography algorithm for wireless channel of CBTC system

open access: yesTongxin xuebao, 2011
As to the disadvantages of RC4 which was used for CBTC system,a new cryptography algorithm based on Montgomery-form ECC was brought forward.Compared with the traditional Montgomery elliptic curve,the improved algorithm would resume the value of y ...
WANG Chao1   +4 more
doaj   +2 more sources

Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications

open access: yesJournal of Engineering
Elliptic-curve cryptography (ECC) is a popular technique of public-key cryptography used for secure communications in Internet of Things (IoT) applications.
Preethi Preethi   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy