Results 141 to 150 of about 95,997 (171)
Some of the next articles are maybe not open access.
Remote Authentication with Forward Security
2006Password authentication has been accepted as an easy-to-use solution in network environment to protect unauthorized access to a remote server. Although many schemes have been proposed, none of them can achieve survivability in case of compromise of a server.
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
openaire +1 more source
Forward Secure Communication in Wireless Sensor Networks
2006We propose a set of security provisions for node to base station communication in wireless sensor networks. It supports standard security requirements, viz. authentication of the origin of data and confidentiality of data. Additionally we use key evolution to achieve forward security which is of particular importance in the face of node capture attacks.
Mauw, S., van Vessem, I., Bos, B.
openaire +1 more source
Practical Forward Secure Signatures using Minimal Security Assumptions
2013Digital signatures are one of the most important cryptographic primitives in practice. They are an enabling technology for eCommerce and eGovernment applications and they are used to distribute software updates over the Internet in a secure way. In this work we introduce two new digital signature schemes: XMSS and its extension XMSS^MT.
openaire +1 more source
Climate change impacts on plant pathogens, food security and paths forward
Nature Reviews Microbiology, 2023Brajesh K Singh +2 more
exaly
The rumen microbiome: balancing food security and environmental impacts
Nature Reviews Microbiology, 2021Itzhak Mizrahi, Robert Wallace
exaly
Nano-enabled pesticides for sustainable agriculture and global food security
Nature Nanotechnology, 2022Deng-jun Wang, Navid B Saleh, Kay T Ho
exaly
Security in quantum cryptography
Reviews of Modern Physics, 2022Christopher Portmann, Renato Renner
exaly

