Results 51 to 60 of about 95,997 (171)
Designing Asymmetric Memristive Behavior in Proton Mixed Conductors for Neuromorphic Applications
Protonic devices that couple ionic and electronic transport are demonstrated as bioinspired neuromorphic elements. The devices exhibit rubber‐like asymmetric memristive behavior with slow voltage‐driven conductance increase and rapid relaxation, enabling simplified read–write operation.
Nada H. A. Besisa +6 more
wiley +1 more source
This study introduces a novel chloro boron subphthalocyanine/polymer blend OFET sensor achieving 0.005 ppb limit of detection for ammonia at room temperature and high selectivity against similar amines. An original theoretical framework is proposed to describe the sensing mechanism, relating analyte molecular volume and Lewis basicity to sensor ...
Kavinraaj Ella Elangovan +6 more
wiley +1 more source
Efficient handover authentication and secure key-updating mechanism for B5G networks
In order to solve the problems of 5G network handover authentication and key update mechanism, such as lacking of forward security, being vulnerable to bypass attack and having signaling congestion, for 5G enhanced (B5G) network, an efficient handover ...
Qimei CUI +6 more
doaj +2 more sources
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
For the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication,privacy protection and forward security,a RFID security authentication scheme based on ...
Wumei ZHANG
doaj +2 more sources
Quantum-Resistant Forward-Secure Digital Signature Scheme Based on q-ary Lattices
In this paper, we design and consider a new digital signature scheme with an evolving secret key, using random q-ary lattices as its domain. It is proved that, in addition to offering classic eu-cma security, the scheme is existentially forward ...
Mariusz Jurkiewicz
doaj +1 more source
Forward Secure Ring Signature without Random Oracles [PDF]
In this paper, we propose a forward secure ring signature scheme without random oracles. With forward security, if a secret key of a corresponding ring member is exposed, all previously signed signatures containing this member remain valid. Yet the one who has stolen the secret key cannot produce any valid signature belonged to the past time period ...
Yuen, TH, Liu, JK, Zhou, J
openaire +2 more sources
Secure Inter-domain Routing and Forwarding via Verifiable Forwarding Commitments
The Internet inter-domain routing system is vulnerable. On the control plane, the de facto Border Gateway Protocol (BGP) does not have built-in mechanisms to authenticate routing announcements, so an adversary can announce virtually arbitrary paths to hijack network traffic; on the data plane, it is difficult to ensure that actual forwarding path ...
Wang, Xiaoliang +8 more
openaire +2 more sources
Perfect Forward Security of SPAKE2
SPAKE2 is a balanced password-authenticated key exchange (PAKE) protocol, proposed by Abdalla and Pointcheval at CTRSA 2005. Due to its simplicity and efficiency, SPAKE2 is one of the balanced PAKE candidates currently under consideration for standardization by the CFRG, together with SPEKE, CPace, and J-PAKE.
Abdalla, Michel, Barbosa, Manuel
openaire +2 more sources
Tighter Reductions for Forward-Secure Signature Schemes [PDF]
In this paper, we revisit the security of factoring-based signature schemes built via the Fiat-Shamir transform and show that they can admit tighter reductions to certain decisional complexity assumptions such as the quadratic-residuosity, the high-residuosity, and the φ- hiding assumptions.
Abdalla, Michel +2 more
openaire +2 more sources
Security Analysis of Forward Secure Log Sealing in Journald
This paper presents a security analysis of forward-secure log sealing in the journald logging system, which is installed by default in almost all modern Linux distributions. Forward-secure log sealing is a cryptographic technique used to ensure the integrity of past log entries even in the event of a full system compromise.
Felix Dörre, Astrid Ottenhues
openaire +2 more sources

