Results 11 to 20 of about 561,825 (309)

Secure Vehicular Platoon Management against Sybil Attacks

open access: yesSensors, 2022
The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have inflated to record levels.
Danial Ritzuan Junaidi   +2 more
doaj   +1 more source

Efficient Authentication Protocol and Its Application in Resonant Inductive Coupling Wireless Power Transfer Systems

open access: yesSensors, 2021
Chaos theory and its extension into cryptography has generated significant applications in industrial mixing, pulse width modulation and in electric compaction.
Emmanuel Ahene   +4 more
doaj   +1 more source

A novel missense mutation in the HSF4 gene of giant pandas with senile congenital cataracts

open access: yesScientific Reports, 2021
Cataracts are a common cause of visual impairment and blindness in mammals. They are usually associated with aging, but approximately one third of cases have a significant genetic component. Cataracts are increasingly prevalent among aging populations of
Yuyan You   +18 more
doaj   +1 more source

Implementation theoretical information protocol for public distribution cryptology keys [PDF]

open access: yesSerbian Journal of Electrical Engineering, 2016
This paper presents the design and implementation of a key distribution protocol over public channels. This protocol has its own source of randomness, based on data from civil air traffic.
Tatović Milomir   +2 more
doaj   +1 more source

Discrete Logarithmic Factorial Problem and Einstein Crystal Model Based Public-Key Cryptosystem for Digital Content Confidentiality

open access: yesIEEE Access, 2022
Public-key encryption is extensively used to provide digital data confidentiality and deliver the security features, such as nonrepudiation (digital signature) and secure key exchange.
Muhammad Waseem Hafiz   +4 more
doaj   +1 more source

MAKE: A matrix action key exchange [PDF]

open access: yesJournal of Mathematical Cryptology, 2022
AbstractWe offer a public key exchange protocol based on a semidirect product of two cyclic (semi)groups of matrices overZp{{\mathbb{Z}}}_{p}. One of the (semi)groups is additive, and the other one is multiplicative. This allows us to take advantage of both operations on matrices to diffuse information.
Rahman Nael, Shpilrain Vladimir
openaire   +4 more sources

On Wireless Channel Parameters for Key Generation in Industrial Environments

open access: yesIEEE Access, 2018
The advent of industry 4.0 with its idea of individualized mass production will significantly increase the demand for more flexibility on the production floor.
Dan Kreiser   +6 more
doaj   +1 more source

RUAM-IoD: A Robust User Authentication Mechanism for the Internet of Drones

open access: yesIEEE Access, 2022
The revolutionary advancement in the capabilities of hardware tools, software packages, and communication techniques gave rise to the Internet of Things-supported drone networks (IoD), thereby enabling smooth communication among devices and applications,
Muhammad Tanveer   +5 more
doaj   +1 more source

Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms [PDF]

open access: yesEngineering and Technology Journal, 2014
The key management is an important area of research in internet applications, because protecting secret messages during transmission becomes an essential issue for the Internet. Elliptic Curve Cryptography (ECC) has attracted the attention of researchers
Hala Bahjat Abdul Wahab   +2 more
doaj   +1 more source

PASKE-IoD: Privacy-Protecting Authenticated Key Establishment for Internet of Drones

open access: yesIEEE Access, 2021
Unmanned aerial vehicles/drones are considered an essential ingredient of traffic motoring systems in smart cities. Interconnected drones, also called the Internet of Drones (IoD), gather critical data from the environmental area of interest and transmit
Muhammad Tanveer   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy