Results 51 to 60 of about 23,175 (170)

Message Authentication Code over a Wiretap Channel

open access: yes, 2015
Message Authentication Code (MAC) is a keyed function $f_K$ such that when Alice, who shares the secret $K$ with Bob, sends $f_K(M)$ to the latter, Bob will be assured of the integrity and authenticity of $M$.
Chen, Dajiang   +2 more
core   +1 more source

Efficient and Low-Cost RFID Authentication Schemes [PDF]

open access: yes, 2011
Security in passive resource-constrained Radio Frequency Identification (RFID) tags is of much interest nowadays. Resistance against illegal tracking, cloning, timing, and replay attacks are necessary for a secure RFID authentication scheme.
Miyaji, Atsuko   +2 more
core   +1 more source

Securing the Internet of Things Infrastructure - Standards and Techniques [PDF]

open access: yes, 2014
The Internet of Things (IoT) infrastructure is a conglomerate of electronic devices interconnected through the Internet, with the purpose of providing prompt and effective service to end-users.
Baig, Zubair A
core   +1 more source

Ubic: Bridging the gap between digital cryptography and the physical world

open access: yes, 2014
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman   +6 more
core   +1 more source

A Quantum-Resistant Identity Authentication and Key Agreement Scheme for UAV Networks Based on Kyber Algorithm

open access: yesDrones
Unmanned aerial vehicles (UAVs) play a critical role in various fields, including logistics, agriculture, and rescue operations. Effective identity authentication and key agreement schemes are vital for UAV networks to combat threats.
Tao Xia   +5 more
doaj   +1 more source

Securing Our Future Homes: Smart Home Security Issues and Solutions [PDF]

open access: yes, 2019
The Internet of Things, commonly known as IoT, is a new technology transforming businesses, individuals’ daily lives and the operation of entire countries.
Romano, Nicholas
core   +1 more source

TCG based approach for secure management of virtualized platforms: state-of-the-art [PDF]

open access: yes, 2010
There is a strong trend shift in the favor of adopting virtualization to get business benefits. The provisioning of virtualized enterprise resources is one kind of many possible scenarios.
Aslam, Mudassar, Gehrmann, Christian
core  

Multilayered digital image encryption approach to resist cryptographic attacks for cybersecurity [PDF]

open access: yesPeerJ Computer Science
In today’s digital age, protecting sensitive image data is more important than ever, especially with the rise of computing advancements, which threaten traditional encryption methods.
Sanjay Das   +7 more
doaj   +2 more sources

KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks [PDF]

open access: yes, 2008
Key management is the pillar of a security architecture. Body sensor networks(BSNs) pose several challenges -- some inherited from wireless sensor networks(WSNs), some unique to themselves -- that require a new key management scheme to be tailor-made ...
Gong, Z.   +4 more
core   +2 more sources

Key Management Building Blocks for Wireless Sensor Networks [PDF]

open access: yes, 2007
Cryptography is the means to ensure data confidentiality, integrity and authentication in wireless sensor networks (WSNs). To use cryptography effectively however, the cryptographic keys need to be managed properly.
Doumen, J.M., Law, Y.W., Palaniswami, M.
core   +2 more sources

Home - About - Disclaimer - Privacy