Results 41 to 50 of about 12,317,693 (236)
ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things
The Internet of Medical Things (IoMT) is a unification of smart healthcare devices, tools, and software, which connect various patients and other users to the healthcare information system through the networking technology. It further reduces unnecessary
Mohammad Wazid +5 more
doaj +1 more source
PUF-Assisted Lightweight Group Authentication and Key Agreement Protocol in Smart Home
Various IoT-based applications such as smart home, intelligent medical, and VANETs have been put into practical utilization. The smart home is one of the most concerned environments, allowing users to access and control smart devices via the public ...
Yandong Xia +5 more
semanticscholar +1 more source
Bounds on entanglement distillation and secret key agreement for quantum broadcast channels [PDF]
The squashed entanglement of a quantum channel is an additive function of quantum channels, which finds application as an upper bound on the rate at which secret key and entanglement can be generated when using a quantum channel a large number of times ...
Seshadreesan, Kaushik P. +2 more
core +3 more sources
A Secure User Authentication Protocol for Heterogeneous Mobile Environments
Mobile devices have become very important for our daily needs. The user authentication protocols with the key agreement are required to deal with the security issues that arise from the use of mobile devices through Internet applications.
Alzubair Hassan +7 more
doaj +1 more source
A Survey on Key Agreement and Authentication Protocol for Internet of Things Application
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and network communication technology to establish ubiquitous connectivity among people, machines, and objects.
M. Hasan +4 more
semanticscholar +1 more source
Overcoming fundamental bounds on quantum conference key agreement [PDF]
Twin-Field Quantum Key Distribution (TF-QKD) enables two distant parties to establish a shared secret key, by interfering weak coherent pulses (WCPs) in an intermediate measuring station. This allows TF-QKD to reach greater distances than traditional QKD
Giacomo Carrara +2 more
semanticscholar +1 more source
Cryptanalysing variants of Stickel's key agreement scheme
Stickel's key agreement scheme was successfully cryptanalysed by V. Shpilrain when GL(n, q) is used as a platform. Shpilrain suggested the algebra of all (not necessarily invertible) n × n matrices defined over some finite ring R would make a more secure
Mullan Ciaran
doaj +1 more source
Converses for Secret Key Agreement and Secure Computing
We consider information theoretic secret key agreement and secure function computation by multiple parties observing correlated data, with access to an interactive public communication channel.
Tyagi, Himanshu, Watanabe, Shun
core +1 more source
On the Optimality of Secret Key Agreement via Omniscience
For the multiterminal secret key agreement problem under a private source model, it is known that the maximum key rate, i.e., the secrecy capacity, can be achieved through communication for omniscience, but the omniscience strategy can be strictly ...
Chan, Chung +3 more
core +1 more source
In the global village era, several competitions require pre-checkups for the participants who are qualified to participate that must be passed before the competition, so the accuracy of the checkup data must be confirmed and must not be leaked or ...
Tsung-Hung Lin, Ming-Te Chen
doaj +1 more source

