Results 11 to 20 of about 1,614,631 (234)
Key management for blockchain technology
Public Key Infrastructure (PKI) is used in Blockchain Technology to authenticate the entities and to ensure the integrity of the blockchain. Proper Protection of Bitcoin wallet is required for private keys, seeds and keys stored in external hardware in ...
Om Pal +3 more
doaj +1 more source
Key management describes how cryptographic keys are created, securely stored, distributed to the respective key holders, and used in accordance with protocol specifications. It is thus a cornerstone of most cryptographic systems and must be handled with care.
Krähenbühl, Cyrill +1 more
openaire +3 more sources
MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection
Privacy-preserving of medical information (such as medical records and images) is an essential right for patients to ensure security against undesired access parties.
Ashraf Ahmad +5 more
doaj +1 more source
A Novel Privacy Preserving Scheme for Smart Grid-Based Home Area Networks
Despite the benefits of smart grids, concerns about security and privacy arise when a large number of heterogeneous devices communicate via a public network.
Wajahat Ali +3 more
doaj +1 more source
EStore: A User-Friendly Encrypted Storage Scheme for Distributed File Systems
In this paper, we propose a user-friendly encrypted storage scheme named EStore, which is based on the Hadoop distributed file system. Users can make use of cloud-based distributed file systems to collaborate with each other.
Yuxiang Chen +4 more
doaj +1 more source
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes.
Kashif Saleem +6 more
doaj +1 more source
The Role of Physical Layer Security in IoT: A Novel Perspective
This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT) system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem ...
Tommaso Pecorella +2 more
doaj +1 more source
Industrial Automation and Control Systems (IACS) are broadly utilized in critical infrastructures for monitoring and controlling the industrial processes remotely. The real-time transmissions in such systems provoke security breaches.
Pramod T. C. +3 more
doaj +1 more source
A Decentralized Proxy-JRC Authentication System for Scalable IETF 6TiSCH Networks
Many Industrial Internet of Things (IIoT) applications require wireless networks with low power consumption, low latency, and secure communication. The IPv6 over the TSCH mode of IEEE 802.15.4e (IETF 6TiSCH) standard has been created to fulfill these ...
Hakan Aydin, Sedat Gormus, Burak Aydin
doaj +1 more source
A Study on the Key Management Strategy for Wireless Sensor Networks
Many users who are in a cyber-space usually want to join the social group to have or to share their information. Now, there are two ways to join the group, the group manager invites them, and the users who want to join ask the owner. These days the group
Hoon KO +5 more
doaj +1 more source

