Results 21 to 30 of about 6,477,960 (317)

Security Improve in ZigBee Protocol Based on RSA Public Algorithm in WSN [PDF]

open access: yesEngineering and Technology Journal, 2019
ZigBee is consuming low energy and providing the protection in Wireless Sensor Networks. ZigBee pro is supporting most applications. In spite of improved the security, ZigBee pro weak in key administration. In this paper, we depend on Logistic Map Diffie
Nabaa Hasan, Alaa Farhan
doaj   +1 more source

Research on key management and authentication protocol of PDA in smart grid

open access: yes网络与信息安全学报, 2018
According to PDA in smart grid,which faced with security issues,key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.With the construction of mobile trusted platform by trusted hardware module and PDA,a ...
Xiao YU, Li TIAN, Zhe LIU, Jie WANG
doaj   +3 more sources

Key management scheme with private key self-healing ability in DTN

open access: yes网络与信息安全学报, 2017
Because of the large delay of DTN network,node cannot receive broadcast updating private key messages in a timely manner,thus unable to update the private key for a certain time period.Aiming at this problem,an allowing private key self-healing ...
De-quan LI,Xi-yong ZHANG,Ting-ting ZHANG   +1 more
doaj   +1 more source

Key management for blockchain technology

open access: yesICT Express, 2021
Public Key Infrastructure (PKI) is used in Blockchain Technology to authenticate the entities and to ensure the integrity of the blockchain. Proper Protection of Bitcoin wallet is required for private keys, seeds and keys stored in external hardware in ...
Om Pal   +3 more
doaj   +1 more source

Key Management

open access: yes, 2023
Key management describes how cryptographic keys are created, securely stored, distributed to the respective key holders, and used in accordance with protocol specifications. It is thus a cornerstone of most cryptographic systems and must be handled with care.
Krähenbühl, Cyrill   +1 more
openaire   +3 more sources

MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection

open access: yesJournal of Sensor and Actuator Networks, 2022
Privacy-preserving of medical information (such as medical records and images) is an essential right for patients to ensure security against undesired access parties.
Ashraf Ahmad   +5 more
doaj   +1 more source

Disability management: Key concepts and techniques for an aging workforce [PDF]

open access: yes, 2008
The aging workforce is likely to result in increasing numbers of workers with disabilities. The U.S. Census Bureau projects that the 45-54 and 55-64 year-old population in the United States will grow by nearly 44.2 million (17%) and 35 million (39%) in ...
Bruyere, Susanne M, Dr.
core   +2 more sources

A Novel Privacy Preserving Scheme for Smart Grid-Based Home Area Networks

open access: yesSensors, 2022
Despite the benefits of smart grids, concerns about security and privacy arise when a large number of heterogeneous devices communicate via a public network.
Wajahat Ali   +3 more
doaj   +1 more source

EStore: A User-Friendly Encrypted Storage Scheme for Distributed File Systems

open access: yesSensors, 2023
In this paper, we propose a user-friendly encrypted storage scheme named EStore, which is based on the Hadoop distributed file system. Users can make use of cloud-based distributed file systems to collaborate with each other.
Yuxiang Chen   +4 more
doaj   +1 more source

Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

open access: yesSensors, 2016
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes.
Kashif Saleem   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy