Results 31 to 40 of about 2,989,875 (336)
Rahman and Shpilrain proposed a Diffie–Hellman style key exchange based on a semidirect product of n×nn\times n-matrices over a finite field. We show that, using public information, an adversary can recover the agreed upon secret key by solving a system ...
Brown Daniel R. L. +2 more
doaj +1 more source
Predicate-Based Key Exchange [PDF]
We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session key security, our security model also provides for credential privacy: a participating party learns nothing more about the other party's credentials than whether they satisfy ...
Birkett, James, Stebila, Douglas
openaire +3 more sources
The effect of ZnO nanoparticles (ZnO NPs), with different concentrations in simulated water, on the activity of sulfate-reducing bacteria (SRB) and their adhesion behaviour on stainless-steel surfaces, with and without visible light treatment, were ...
Hua Yang +7 more
doaj +1 more source
Tree Parity Machine Rekeying Architectures [PDF]
The necessity to secure the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e.
Volkmer, Markus, Wallner, Sebastian
core +5 more sources
On the leakage-resilient key exchange [PDF]
AbstractTypically, secure channels are constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties based on long-term public keys and establishes secret session keys. In this paper we address the partial leakage of long-term secret keys of key exchange protocol participants due to various side-channel ...
openaire +4 more sources
Attachment and separation of sulfate-reducing bacteria (SRB) biofilm on stainless steel (SS) in simulated cooling water with and without different sterilization treatments was investigated by calculation of surface energy, theoretical work of adhesion ...
Yi Zhang +6 more
doaj +1 more source
Enhanced secure key exchange systems based on the Johnson-noise scheme [PDF]
We introduce seven new versions of the Kirchhoff-Law-Johnson-(like)-Noise (KLJN) classical physical secure key exchange scheme and a new transient protocol for practically-perfect security.
Kish, Laszlo B.
core +3 more sources
Location-enhanced authenticated key exchange [PDF]
We introduce LOCATHE (Location-Enhanced Authenticated Key Exchange), a generic protocol that pools location, user attributes, access policy and desired services into a multi-factor authentication, allowing two peers to establish a secure, encrypted session and perform mutual authentication with pre-shared keys, passwords and other authentication ...
Marcos Portnoi, Chien-Chung Shen
openaire +3 more sources
With the increasing use of mobile devices, a secure communication and key exchange become the significant security issues in mobile environments. However, because of open network environments, mobile user can be vulnerable to various attacks.
Kisung Park +3 more
doaj +1 more source
3.3 Gigahertz Clocked Quantum Key Distribution System [PDF]
A fibre-based quantum key distribution system operating up to a clock frequency of 3.3GHz is presented. The system demonstrates significantly increased key exchange rate potential and operates at a wavelength of 850nm.Comment: Presented at ECOC 05 ...
Buller, Gerald S. +6 more
core +2 more sources

