Results 241 to 250 of about 4,621,200 (286)
Some of the next articles are maybe not open access.

Covert secret key generation

2017 IEEE Conference on Communications and Network Security (CNS), 2017
We investigate the possibility of covert and secret key generation over a discrete memoryless channel model with one way public discussion. Protocols are required to conceal not only the key but also whether a protocol is being implemented. For some models, we show that covert secret key generation is possible and characterize the covert secret key ...
Mehrdad Tahmasbi, Matthieu R. Bloch
openaire   +1 more source

Single Private-Key Generator Security Implies Multiple Private-Key Generators Security

2018
This paper discusses the security of identity-based cryptography with multiple private-key generators (mPKG-IBC). Most mPKG-IBC schemes and protocols are statically secure where private-key generators (PKGs) cannot control a binding between a party and its PKG.
Atsushi Fujioka, Kazuki Yoneyama
openaire   +1 more source

Generic key performance indicators

The Third International Conference on e-Technologies and Networks for Development (ICeND2014), 2014
This paper tackles the concept of key performance indicators (KPI) that is being hosted in almost all software systems, trying to make use computer systems and algorithms to optimize and help concerned parties with more efficient analysis of data being given to them.
Chadi Kallab, Marc Ghawi
openaire   +1 more source

Key Generation

2022
Surendra Kumar, Narander Kumar
openaire   +2 more sources

Public Key Infrastructures - The Next Generation

BT Technology Journal, 2001
A public key infrastructure (PKI) is a credential verification scheme based upon public/private key-pair cryptography. This paper explores the PKI story so far and then goes on to identify some of the problems that stand in the way of globalisation and truly successful commercial PKI interworking. Current solutions to these problems are explained, with
K P Bosworth, N Tedeschi
openaire   +1 more source

Efficient ZHFE Key Generation

2016
In this paper we present a new algorithm to construct the keys of the multivariate public key encryption scheme ZHFE. Constructing ZHFE's trapdoor involves finding a low degree polynomial of q-Hamming-weight-three, as an aid to invert a pair of q-Hamming-weight-two polynomials of high degree and high rank.
John B. Baena   +4 more
openaire   +1 more source

Generalized key player problem

Computational and Mathematical Organization Theory, 2014
The key player problem (KPP) identifies a set of key nodes that have a central role in a network. In this paper, we propose a generalized KPP (GKPP) that extends existing work on KPP-Pos and KPP-Neg in such a way that it can consider network structure, node attributes, and the characteristics of edges.
openaire   +1 more source

Key Issues Uniting Generations

2010
Christopher Buckley’s satire, Boomsday, opens with Gen Xers attacking a gated retirement community in protest of the taxes they must pay to support aging “baby boomers” who do nothing but play golf during their long, leisurely retirement years. Encouraged by blogger Cassandra Devine, a new plan is introduced in Congress to address the growing conflict.
openaire   +1 more source

PUF-Based Key Generation

2013
This chapter treats the most interesting application of intrinsic PUFs, i.e., their ability to produce and store on-chip secrets in a highly secure manner. PUF-based key storage has unique physical advantages over traditional key storage mechanisms, e.g., it does not require on-chip secure non-volatile memory, keys are generated inside the chip and ...
openaire   +1 more source

Key Generation for Internet of Things

ACM Computing Surveys, 2022
Weitao Xu, Junqing Zhang
exaly  

Home - About - Disclaimer - Privacy