Results 61 to 70 of about 1,501 (168)

An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things

open access: yesSensors, 2019
Internet of Thing (IoT) is the most emerging technology in which all the objects in the real world can use the Internet to communicate with each other as parts of a single unified system.
Adel Ali Ahmed, Waleed Ali Ahmed
doaj   +1 more source

Consensus Mechanism of IoT Based on Blockchain Technology

open access: yesShock and Vibration, 2020
Applying blockchain technology to the Internet of Things (IoT) remains a huge challenge. To meet the actual needs of IoT, a lightweight and high-throughput consensus mechanism, combined with blockchain technology, is proposed in this study.
Yue Wu   +5 more
doaj   +1 more source

Further Analysis of PRNG-Based Key Derivation Functions

open access: yesIEEE Access, 2019
The Internet of Things (IoT) is growing at a rapid pace. With everyday applications and services becoming wirelessly networked, security still is a major concern.
Jason M. Mcginthy, Alan J. Michaels
doaj   +1 more source

Hardware Security for Edge Computing Via CMOS‐Compatible Multi‐Level Flash Memory with Hash‐Based Key Generation

open access: yesAdvanced Electronic Materials
Ensuring secure and energy‐efficient authentication of resource‐constrained devices has become a critical challenge owing to the rapid expansion of the Internet of Things (IoT) ecosystem.
Kyumin Sim   +6 more
doaj   +1 more source

An Efficient Continuous-Variable Quantum Key Distribution with Parameter Optimization Using Elitist Elk Herd Random Immigrants Optimizer and Adaptive Depthwise Separable Convolutional Neural Network

open access: yesFuture Internet
Quantum memory is essential for the prolonged storage and retrieval of quantum information. Nevertheless, no current studies have focused on the creation of effective quantum memory for continuous variables while accounting for the decoherence rate. This
Vidhya Prakash Rajendran   +3 more
doaj   +1 more source

Bases selection with pseudo-random functions in BB84 scheme

open access: yesHeliyon
Because the spectrum of services available in modern telecommunication networks is constantly expanding, security has become increasingly important. Simultaneously, in an era of constant progress in mathematics and computing, the security of existing ...
Emir Dervisevic   +2 more
doaj   +1 more source

Another look at HMAC

open access: yesJournal of Mathematical Cryptology, 2013
HMAC is the most widely-deployed cryptographic-hash-function-based message authentication code. First, we describe a security issue that arises because of inconsistencies in the standards and the published literature regarding keylength.
Koblitz Neal, Menezes Alfred
doaj   +1 more source

Research and Implementation of Secure Upgrade Method for Embedded Control Software

open access: yesKongzhi Yu Xinxi Jishu
In order to respond to challenges encountered in the software upgrade of embedded systems due to frequent demand changes and technological iterations, this paper presents the design of a secure software upgrade methodology and process.
CHEN Junbo, ZOU Junyang, ZHANG Tianyu
doaj  

A COMPETENT MAC SCHEME DESIGNED USING A UNIQUE DNA-BRNG KEY AND A NOVEL HASH ALGORITHM [PDF]

open access: yesJournal of Engineering Science and Technology, 2018
The current communication sector demands security over anything else. Considering the confidential data transmission and involvement of technology in everyday payment modes, many schemes have been employed in order to achieve this goal.
GURPREET K. SODHI, GURJOT S. GABA
doaj  

Home - About - Disclaimer - Privacy