Results 31 to 40 of about 1,013,153 (241)

Key Agreement Scheme Based on Ocean Acoustic Channel [PDF]

open access: yesJisuanji kexue, 2022
Aiming at the problem that underwater acoustic channel is vulnerable to various threats and attacks due to the uncertainty of marine environment,a key agreement scheme based on ocean acoustic channel is proposed.Firstly,the uncertainty of marine ...
LIANG Zhen-zhen, XU Ming
doaj   +1 more source

A Secure User Authentication Protocol for Heterogeneous Mobile Environments

open access: yesIEEE Access, 2022
Mobile devices have become very important for our daily needs. The user authentication protocols with the key agreement are required to deal with the security issues that arise from the use of mobile devices through Internet applications.
Alzubair Hassan   +7 more
doaj   +1 more source

Cryptanalysing variants of Stickel's key agreement scheme

open access: yesJournal of Mathematical Cryptology, 2011
Stickel's key agreement scheme was successfully cryptanalysed by V. Shpilrain when GL(n, q) is used as a platform. Shpilrain suggested the algebra of all (not necessarily invertible) n × n matrices defined over some finite ring R would make a more secure
Mullan Ciaran
doaj   +1 more source

An Integrated Two-Stage Medical Pre-Checkup and Subsequent Validation Key Agreement Authentication Mechanism

open access: yesApplied Sciences, 2020
In the global village era, several competitions require pre-checkups for the participants who are qualified to participate that must be passed before the competition, so the accuracy of the checkup data must be confirmed and must not be leaked or ...
Tsung-Hung Lin, Ming-Te Chen
doaj   +1 more source

Hierarchical certificateless authenticated key agreement protocol

open access: yesTongxin xuebao, 2016
A hierarchical certificateless authenticated key agreement protocol was proposed, and the proposed protocol was proved secure in extended Canetti-Krawczyk (eCK) model, the security of the protocol was based on the computa-tional Diffie-Hellman assumption.
Hang SU, Jian-wei LIU, Rui TAO
doaj   +2 more sources

Questioning Key Compromise Attack on Ostad-Sharif et al.’s Authentication and Session key Generation Scheme for Healthcare Applications

open access: yesIEEE Access, 2019
Recently, Ostad-Sharif et al. pointed out the susceptibility of three different authentication schemes themed for telecare medicine/medical information systems to key compromise impersonation attack (KCIA). To further address this issue, they proposed an
Saru Kumari   +3 more
doaj   +1 more source

A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks

open access: yesIEEE Access, 2020
Certificateless public-key cryptography has conquered both the certificate management problem in the traditional public-key cryptography and the key escrow problem in the ID-based public-key cryptography. Certificateless authenticated key exchange (CLAKE)
Tsung-Che Hsieh   +2 more
doaj   +1 more source

The HIT Network for Children and Adolescents With CNS Tumors Facilitates Improvements of Diagnostic Assessments, Multimodal Treatments, Individual Counseling, and Research in Germany, Austria, and Switzerland

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background The HIT network was established in 2000 to create a population‐based structure aiming to improve survival rates and reduce late effects for children with central nervous system (CNS) tumors by conducting comprehensive clinical trials.
Stefan Rutkowski   +59 more
wiley   +1 more source

Key agreement based on automaton groups [PDF]

open access: yesGroups Complexity Cryptology, 2019
Abstract We suggest several automaton groups as platforms for Anshel–Anshel–Goldfeld key agreement metascheme. They include Grigorchuk and universal Grigorchuk groups, Hanoi 3-towers group, the Basilica group and a subgroup of the affine group
Grigorchuk, R., Grigoriev, D.
openaire   +4 more sources

Stressful Events Reported by Childhood Cancer Survivors and Community Controls From the St. Jude Lifetime (SJLIFE) Cohort: A Mixed Method Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction Characterizing stressful events reported by childhood cancer survivors experienced throughout the lifespan may help improve trauma‐informed care relevant to the survivor experience. Methods Participants included 2552 survivors (54% female; 34 years of age) and 469 community controls (62% female; 33 years of age) from the St.
Megan E. Ware   +13 more
wiley   +1 more source

Home - About - Disclaimer - Privacy