Results 61 to 70 of about 23,175 (170)

A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash

open access: yes, 2011
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed   +2 more
core   +1 more source

A Fragile Watermarking Scheme for Authenticity Verification of 3D Models in GLB Format

open access: yesApplied Sciences
The utilisation of 3D models in low-cost devices, such as the internet of things, virtual reality, and augmented reality, is expanding. The challenge lies in the lack of lightweight solutions for verifying the authenticity of models in the graphics ...
Marcin Matczuk   +2 more
doaj   +1 more source

An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things

open access: yesSensors, 2019
Internet of Thing (IoT) is the most emerging technology in which all the objects in the real world can use the Internet to communicate with each other as parts of a single unified system.
Adel Ali Ahmed, Waleed Ali Ahmed
doaj   +1 more source

Consensus Mechanism of IoT Based on Blockchain Technology

open access: yesShock and Vibration, 2020
Applying blockchain technology to the Internet of Things (IoT) remains a huge challenge. To meet the actual needs of IoT, a lightweight and high-throughput consensus mechanism, combined with blockchain technology, is proposed in this study.
Yue Wu   +5 more
doaj   +1 more source

A quantum key distribution protocol for rapid denial of service detection [PDF]

open access: yes, 2017
We introduce a quantum key distribution protocol designed to expose fake users that connect to Alice or Bob for the purpose of monopolising the link and denying service. It inherently resists attempts to exhaust Alice and Bob's initial shared secret, and
Erven, Chris   +2 more
core   +2 more sources

Performance analysis of a security architecture for active networks in Java [PDF]

open access: yes, 2003
Internacional Association of Science and Technology for Development - IASTED, Benalmadena, Spain: 8-10 Septiembre, 2003.Active network technology supports the deployment and execution on the fly of new active services, without interrupting the network ...
Alarcos, Bernardo   +3 more
core   +2 more sources

An Efficient Continuous-Variable Quantum Key Distribution with Parameter Optimization Using Elitist Elk Herd Random Immigrants Optimizer and Adaptive Depthwise Separable Convolutional Neural Network

open access: yesFuture Internet
Quantum memory is essential for the prolonged storage and retrieval of quantum information. Nevertheless, no current studies have focused on the creation of effective quantum memory for continuous variables while accounting for the decoherence rate. This
Vidhya Prakash Rajendran   +3 more
doaj   +1 more source

Further Analysis of PRNG-Based Key Derivation Functions

open access: yesIEEE Access, 2019
The Internet of Things (IoT) is growing at a rapid pace. With everyday applications and services becoming wirelessly networked, security still is a major concern.
Jason M. Mcginthy, Alan J. Michaels
doaj   +1 more source

Bases selection with pseudo-random functions in BB84 scheme

open access: yesHeliyon
Because the spectrum of services available in modern telecommunication networks is constantly expanding, security has become increasingly important. Simultaneously, in an era of constant progress in mathematics and computing, the security of existing ...
Emir Dervisevic   +2 more
doaj   +1 more source

Another look at HMAC

open access: yesJournal of Mathematical Cryptology, 2013
HMAC is the most widely-deployed cryptographic-hash-function-based message authentication code. First, we describe a security issue that arises because of inconsistencies in the standards and the published literature regarding keylength.
Koblitz Neal, Menezes Alfred
doaj   +1 more source

Home - About - Disclaimer - Privacy