Results 61 to 70 of about 1,501 (168)
Internet of Thing (IoT) is the most emerging technology in which all the objects in the real world can use the Internet to communicate with each other as parts of a single unified system.
Adel Ali Ahmed, Waleed Ali Ahmed
doaj +1 more source
Consensus Mechanism of IoT Based on Blockchain Technology
Applying blockchain technology to the Internet of Things (IoT) remains a huge challenge. To meet the actual needs of IoT, a lightweight and high-throughput consensus mechanism, combined with blockchain technology, is proposed in this study.
Yue Wu +5 more
doaj +1 more source
Further Analysis of PRNG-Based Key Derivation Functions
The Internet of Things (IoT) is growing at a rapid pace. With everyday applications and services becoming wirelessly networked, security still is a major concern.
Jason M. Mcginthy, Alan J. Michaels
doaj +1 more source
Ensuring secure and energy‐efficient authentication of resource‐constrained devices has become a critical challenge owing to the rapid expansion of the Internet of Things (IoT) ecosystem.
Kyumin Sim +6 more
doaj +1 more source
Quantum memory is essential for the prolonged storage and retrieval of quantum information. Nevertheless, no current studies have focused on the creation of effective quantum memory for continuous variables while accounting for the decoherence rate. This
Vidhya Prakash Rajendran +3 more
doaj +1 more source
Bases selection with pseudo-random functions in BB84 scheme
Because the spectrum of services available in modern telecommunication networks is constantly expanding, security has become increasingly important. Simultaneously, in an era of constant progress in mathematics and computing, the security of existing ...
Emir Dervisevic +2 more
doaj +1 more source
HMAC is the most widely-deployed cryptographic-hash-function-based message authentication code. First, we describe a security issue that arises because of inconsistencies in the standards and the published literature regarding keylength.
Koblitz Neal, Menezes Alfred
doaj +1 more source
Research and Implementation of Secure Upgrade Method for Embedded Control Software
In order to respond to challenges encountered in the software upgrade of embedded systems due to frequent demand changes and technological iterations, this paper presents the design of a secure software upgrade methodology and process.
CHEN Junbo, ZOU Junyang, ZHANG Tianyu
doaj
A COMPETENT MAC SCHEME DESIGNED USING A UNIQUE DNA-BRNG KEY AND A NOVEL HASH ALGORITHM [PDF]
The current communication sector demands security over anything else. Considering the confidential data transmission and involvement of technology in everyday payment modes, many schemes have been employed in order to achieve this goal.
GURPREET K. SODHI, GURJOT S. GABA
doaj
Leakage‐resilient message authentication code scheme based on hidden identity weak hash proof system [PDF]
Bin Wang
openalex +1 more source

