Results 11 to 20 of about 3,103,043 (192)
PASKE-IoD: Privacy-Protecting Authenticated Key Establishment for Internet of Drones
Unmanned aerial vehicles/drones are considered an essential ingredient of traffic motoring systems in smart cities. Interconnected drones, also called the Internet of Drones (IoD), gather critical data from the environmental area of interest and transmit
Muhammad Tanveer +4 more
doaj +1 more source
MAKE: A matrix action key exchange [PDF]
AbstractWe offer a public key exchange protocol based on a semidirect product of two cyclic (semi)groups of matrices overZp{{\mathbb{Z}}}_{p}. One of the (semi)groups is additive, and the other one is multiplicative. This allows us to take advantage of both operations on matrices to diffuse information.
Rahman Nael, Shpilrain Vladimir
openaire +4 more sources
Generic Security Proof of Quantum Key Exchange using Squeezed States [PDF]
Recently, a Quantum Key Exchange protocol that uses squeezed states was presented by Gottesman and Preskill. In this paper we give a generic security proof for this protocol.
Poels, Karin +2 more
core +7 more sources
A novel missense mutation in the HSF4 gene of giant pandas with senile congenital cataracts
Cataracts are a common cause of visual impairment and blindness in mammals. They are usually associated with aging, but approximately one third of cases have a significant genetic component. Cataracts are increasingly prevalent among aging populations of
Yuyan You +18 more
doaj +1 more source
SIKM – a smart cryptographic key management framework
For a secure data transmission in symmetric cryptography, data are encrypted and decrypted using an identical key. The process of creating, distributing, storing, deploying, and finally revoking the symmetric keys is called key management.
Chaeikar Saman Shojae +3 more
doaj +1 more source
RUAM-IoD: A Robust User Authentication Mechanism for the Internet of Drones
The revolutionary advancement in the capabilities of hardware tools, software packages, and communication techniques gave rise to the Internet of Things-supported drone networks (IoD), thereby enabling smooth communication among devices and applications,
Muhammad Tanveer +5 more
doaj +1 more source
An Active Attack on a Multiparty Key Exchange Protocol [PDF]
The multiparty key exchange introduced in Steiner et al.\@ and presented in more general form by the authors is known to be secure against passive attacks.
Lopez-Ramos, Juan Antonio +3 more
core +4 more sources
On Wireless Channel Parameters for Key Generation in Industrial Environments
The advent of industry 4.0 with its idea of individualized mass production will significantly increase the demand for more flexibility on the production floor.
Dan Kreiser +6 more
doaj +1 more source
Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms [PDF]
The key management is an important area of research in internet applications, because protecting secret messages during transmission becomes an essential issue for the Internet. Elliptic Curve Cryptography (ECC) has attracted the attention of researchers
Hala Bahjat Abdul Wahab +2 more
doaj +1 more source
Public-key encryption is extensively used to provide digital data confidentiality and deliver the security features, such as nonrepudiation (digital signature) and secure key exchange.
Muhammad Waseem Hafiz +4 more
doaj +1 more source

