Results 61 to 70 of about 7,729 (216)

LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments

open access: yes, 2008
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core   +3 more sources

Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation [PDF]

open access: yes, 2018
Data aggregation is an integral part of Advanced Metering Infrastructure (AMI) deployment that is implemented by the concentrator. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth ...
Keoh, Sye Loong   +5 more
core   +1 more source

Security in Metaverse Markets: Challenges and Solutions—A Comprehensive Review

open access: yesExpert Systems, Volume 42, Issue 8, August 2025.
ABSTRACT This review paper provides a systematic overview of the metaverse markets security problems and solutions. The metaverse is an emerging digital space, bridging virtual, augmented and mixed reality environments. As the metaverse evolves, issues related to customer security have emerged, which include breaches of privacy, thefts of identity and ...
Mohammad Z. Aloudat   +3 more
wiley   +1 more source

IMAGE ENCRYPTION USING ELLIPTIC CURVE CRYPTOGRAPHY [PDF]

open access: yes, 2015
This paper deals with encryption of image using Elliptic curve cryptography (ECC).Elliptic curve cryptography (ECC) is an approach to public key cryptography based on algebraic structure of elliptic curves over finite fields. Basic ElGamal elliptic curve
Shukla, Ashutosh
core   +1 more source

Nanoscale Curvature Regulates YAP/TAZ Nuclear Localization Through Nuclear Deformation and Rupture

open access: yesAdvanced Science, Volume 12, Issue 28, July 24, 2025.
This study uses experiments and biophysical modeling to examine the response and adaptation of cells to nanoscale topography of surfaces. It is shown that cytoskeletal assembly and nuclear localization of transcription regulatory factors such as yes‐associated protein (YAP) and transcriptional coactivator with PDZ‐binding motif (TAZ) can be tuned by ...
Emmet A. Francis   +7 more
wiley   +1 more source

A versatile Montgomery multiplier architecture with characteristic three support [PDF]

open access: yes, 2008
We present a novel unified core design which is extended to realize Montgomery multiplication in the fields GF(2n), GF(3m), and GF(p). Our unified design supports RSA and elliptic curve schemes, as well as the identity-based encryption which requires a ...
Ozturk, Erdinc   +4 more
core   +2 more sources

Blockweave: An Arweave‐Based Decentralized Storage Solution to Tackle the Blockchain Trilemma

open access: yesEngineering Reports, Volume 7, Issue 7, July 2025.
Leveraging Arweave's blockweave and Proof‐of‐Access consensus, this framework reduces on‐chain metadata to 48 bytes, enabling throughput up to 7200 TPS, 99%$$ 99\% $$ storage savings, and robust security (Q(0.4)=0.82)$$ \left(\mathrm{Q}(0.4)=0.82\right) $$ while achieving Tier‐S decentralization on $300 mining nodes.
Saha Reno, Koushik Roy, Tamanna Tabassum
wiley   +1 more source

Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors [PDF]

open access: yes, 2015
Resource constraints in smart devices demand an efficient cryptosystem that allows for low power and memory consumption. This has led to popularity of comparatively efficient Elliptic curve cryptog-raphy (ECC).
Malik, Yasir
core   +1 more source

Towards Sustainable IoT: A Digital Signature‐Enhanced Federated Learning Approach

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 4, July/August 2025.
ABSTRACT Federated Learning (FL) is emerging as a premier paradigm for privacy‐preserved Machine Learning (ML), enabling devices to train models without central data pooling collaboratively. In the contemporary Internet of Things (IoT) landscape, characterized by escalating energy consumption and associated carbon footprint, FL is recognized not merely
Shahida Hafeezan Qureshi   +5 more
wiley   +1 more source

Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms [PDF]

open access: yesEngineering and Technology Journal, 2014
The key management is an important area of research in internet applications, because protecting secret messages during transmission becomes an essential issue for the Internet. Elliptic Curve Cryptography (ECC) has attracted the attention of researchers
Hala Bahjat Abdul Wahab   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy