Results 11 to 20 of about 2,989,875 (336)
A new key exchange cryptosystem
In this paper, we will present a new key exchange cryptosystem based on linear algebra, which take less operations but weaker in security than Diffie-Hellman's one.
An-Ping Li
openaire +4 more sources
Efficiency Simultaneous key Exchange-Cryptography Extraction from Public key in Fog-Cloud Federation-Based Secure Offloading for Automatic Weather Stations Observing Systems [PDF]
Considering that in automatic weather station systems, raw data is collected by sensors by AWSs, and these sensors themselves cannot process raw data.
Yashar Salami +2 more
doaj +1 more source
Robust and Lightweight Remote User Authentication Mechanism for Next-Generation IoT-Based Smart Home
The IPv4 address architecture has been declared ended finally due to the fast growth of the Internet of Things (IoT). IPv6 is becoming a next-generation communication protocol and provides all the requirements that the industry needs.
Zeeshan Ashraf +5 more
doaj +1 more source
Secure Vehicular Platoon Management against Sybil Attacks
The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have inflated to record levels.
Danial Ritzuan Junaidi +2 more
doaj +1 more source
Chaos theory and its extension into cryptography has generated significant applications in industrial mixing, pulse width modulation and in electric compaction.
Emmanuel Ahene +4 more
doaj +1 more source
A novel missense mutation in the HSF4 gene of giant pandas with senile congenital cataracts
Cataracts are a common cause of visual impairment and blindness in mammals. They are usually associated with aging, but approximately one third of cases have a significant genetic component. Cataracts are increasingly prevalent among aging populations of
Yuyan You +18 more
doaj +1 more source
MAKE: A matrix action key exchange [PDF]
AbstractWe offer a public key exchange protocol based on a semidirect product of two cyclic (semi)groups of matrices overZp{{\mathbb{Z}}}_{p}. One of the (semi)groups is additive, and the other one is multiplicative. This allows us to take advantage of both operations on matrices to diffuse information.
Rahman Nael, Shpilrain Vladimir
openaire +3 more sources
Lightweight Authenticated Key Exchange With EDHOC
The Internet Engineering Task Force (IETF) and its Lightweight Authenticated Key Exchange working group have produced a solution that enables public-key based authenticated key exchange over the most constrained Internet of Things radio communication technologies.We describe the Ephemeral Diffie-Hellman over COSE (EDHOC) protocol, its expected security
Vučinić, Mališa +3 more
openaire +2 more sources
Implementation theoretical information protocol for public distribution cryptology keys [PDF]
This paper presents the design and implementation of a key distribution protocol over public channels. This protocol has its own source of randomness, based on data from civil air traffic.
Tatović Milomir +2 more
doaj +1 more source
PASKE-IoD: Privacy-Protecting Authenticated Key Establishment for Internet of Drones
Unmanned aerial vehicles/drones are considered an essential ingredient of traffic motoring systems in smart cities. Interconnected drones, also called the Internet of Drones (IoD), gather critical data from the environmental area of interest and transmit
Muhammad Tanveer +4 more
doaj +1 more source

