Results 51 to 60 of about 23,175 (170)
Message Authentication Code over a Wiretap Channel
Message Authentication Code (MAC) is a keyed function $f_K$ such that when Alice, who shares the secret $K$ with Bob, sends $f_K(M)$ to the latter, Bob will be assured of the integrity and authenticity of $M$.
Chen, Dajiang +2 more
core +1 more source
Efficient and Low-Cost RFID Authentication Schemes [PDF]
Security in passive resource-constrained Radio Frequency Identification (RFID) tags is of much interest nowadays. Resistance against illegal tracking, cloning, timing, and replay attacks are necessary for a secure RFID authentication scheme.
Miyaji, Atsuko +2 more
core +1 more source
Securing the Internet of Things Infrastructure - Standards and Techniques [PDF]
The Internet of Things (IoT) infrastructure is a conglomerate of electronic devices interconnected through the Internet, with the purpose of providing prompt and effective service to end-users.
Baig, Zubair A
core +1 more source
Ubic: Bridging the gap between digital cryptography and the physical world
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman +6 more
core +1 more source
Unmanned aerial vehicles (UAVs) play a critical role in various fields, including logistics, agriculture, and rescue operations. Effective identity authentication and key agreement schemes are vital for UAV networks to combat threats.
Tao Xia +5 more
doaj +1 more source
Securing Our Future Homes: Smart Home Security Issues and Solutions [PDF]
The Internet of Things, commonly known as IoT, is a new technology transforming businesses, individuals’ daily lives and the operation of entire countries.
Romano, Nicholas
core +1 more source
TCG based approach for secure management of virtualized platforms: state-of-the-art [PDF]
There is a strong trend shift in the favor of adopting virtualization to get business benefits. The provisioning of virtualized enterprise resources is one kind of many possible scenarios.
Aslam, Mudassar, Gehrmann, Christian
core
Multilayered digital image encryption approach to resist cryptographic attacks for cybersecurity [PDF]
In today’s digital age, protecting sensitive image data is more important than ever, especially with the rise of computing advancements, which threaten traditional encryption methods.
Sanjay Das +7 more
doaj +2 more sources
KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks [PDF]
Key management is the pillar of a security architecture. Body sensor networks(BSNs) pose several challenges -- some inherited from wireless sensor networks(WSNs), some unique to themselves -- that require a new key management scheme to be tailor-made ...
Gong, Z. +4 more
core +2 more sources
Key Management Building Blocks for Wireless Sensor Networks [PDF]
Cryptography is the means to ensure data confidentiality, integrity and authentication in wireless sensor networks (WSNs). To use cryptography effectively however, the cryptographic keys need to be managed properly.
Doumen, J.M., Law, Y.W., Palaniswami, M.
core +2 more sources

