Results 241 to 250 of about 3,543,901 (295)
Some of the next articles are maybe not open access.

Key Exposure Resistant Group Key Agreement Protocol

2021
With the development of the Internet and computer science, the demand for collaboration over the Internet is constantly increasing. The group key agreement (GKA) protocol has been a desirable candidate for this demand. However, the possibility that some parties in the GKA protocol may be tampered with by the adversary leads to the stronger requirement ...
Tianqi Zhou   +4 more
openaire   +1 more source

Securing Cloud Data Under Key Exposure

IEEE Transactions on Cloud Computing, 2019
Recent news reveal a powerful attacker which breaks data confidentiality by acquiring cryptographic keys, by means of coercion or backdoors in cryptographic software. Once the encryption key is exposed, the only viable measure to preserve data confidentiality is to limit the attacker's access to the ciphertext.
Ghassan O. Karame   +3 more
openaire   +1 more source

Nickel Exposure From Keys

Dermatitis, 2013
Keys are an important exposure source of metal allergens to consumers and confer a significant problem for nickel-allergic individuals because of repeated daily use.The aims of this study were to investigate the frequency of nickel and cobalt release in keys and to consider the effectiveness of coatings for preventing metallic allergen release from ...
Dathan, Hamann   +2 more
openaire   +2 more sources

Enhanced blockchain based key management scheme against key exposure attack

Proceedings of the International Conference on Artificial Intelligence, Information Processing and Cloud Computing, 2019
The data collected by IoT devices is of great value, which makes people urgently need a secure device key management strategy to protect their data. Existing works introduce the blockchain technology to transfer the responsibility of key management from the trusted center in the traditional key management strategy to the devices, thus eliminating the ...
Mingxin Ma   +3 more
openaire   +1 more source

Chameleon Hashing Without Key Exposure

2004
Chameleon signatures are based on well established hash-and-sign paradigm, where a chameleon hash function is used to compute the cryptographic message digest. Chameleon signatures simultaneously provide the properties of non-repudiation and non-transferability for the signed message, i.e., the designated recipient is capable of verifying the validity ...
Chen, XF Chen, Xiaofeng   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy