Results 21 to 30 of about 22,603 (282)

IMPLEMENTATION OF A METHOD FOR SYNTHESIZING GROUPS OF SYMMETRIC DOUBLE-OPERAND OPERATIONS OF CRYPTOGRAPHIC INFORMATION CODING FOR BLOCK ENCRYPTION SYSTEMS

open access: yesСучасний стан наукових досліджень та технологій в промисловості, 2022
The object of the study is the processes of building groups of symmetric double-operand operations of cryptographic coding of information. The subject of the study are features of the implementation of a generalized method of synthesis groups of ...
Nataliia Lada, Yuliia Rudnytska
doaj   +1 more source

A Security Framework for JXTA-Overlay [PDF]

open access: yes, 2009
En l'actualitat, la maduresa del camp de la investigació P2P empès a través de nous problemes, relacionats amb la seguretat. Per aquesta raó, la seguretat comença a convertir-se en una de les qüestions clau en l'avaluació d'un sistema P2P, i és important
Arnedo Moreno, Joan   +3 more
core   +3 more sources

Efficient scalar multiplication of ECC using SMBR and fast septuple formula for IoT

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
In order to solve the problem between low power of Internet of Things devices and the high cost of cryptography, lightweight cryptography is required. The improvement of the scalar multiplication can effectively reduce the complexity of elliptic curve ...
Chong Guo, Bei Gong
doaj   +1 more source

Secure VANET Authentication Protocol (SVAP) Using Chebyshev Chaotic Maps for Emergency Conditions

open access: yesIEEE Access, 2022
It is crucial to support emergency applications provided by vehicular adhoc network (VANET) through enabling vehicles to quickly access to the infrastructure and consequently request rescue services.
Roayat I. Abdelfatah   +2 more
doaj   +1 more source

I2PA, U-prove, and Idemix: An Evaluation of Memory Usage and Computing Time Efficiency in an IoT Context

open access: yes, 2020
The Internet of Things (IoT), in spite of its innumerable advantages, brings many challenges namely issues about users' privacy preservation and constraints about lightweight cryptography.
AA Ciss   +10 more
core   +1 more source

Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks [PDF]

open access: yes, 2008
Since the introduction at Crypto'05 by Juels and Weis of the protocol HB+, a lightweight protocol secure against active attacks but only in a detection based-model, many works have tried to enhance its security.
Bringer, Julien, Chabanne, Herve
core   +2 more sources

Evaluating the Performance of Lightweight Ciphers in Constrained Environments—The Case of Saturnin

open access: yesSignals, 2022
The use of lightweight cryptographic algorithms is essential for addressing security in highly constrained environments such as the Internet of Things. In this paper, the performance of lightweight block ciphers in such highly constrained environments is
Panagiotis Podimatas   +1 more
doaj   +1 more source

I2PA : An Efficient ABC for IoT [PDF]

open access: yes, 2019
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz   +2 more
core   +3 more sources

A-VIP: Anonymous Verification and Inference of Positions in Vehicular Networks [PDF]

open access: yes, 2013
MiniconferenceInternational audienceKnowledge of the location of vehicles and tracking of the routes they follow are a requirement for a number of applications, including e-tolling and liability attribution in case of accidents.
Borgiattino, Carlo   +5 more
core   +3 more sources

Secure and Efficient Authentication Scheme in IoT Environments

open access: yesApplied Sciences, 2021
Optimization of resource consumption and decreasing the response time of authentication requests is an immense urgent requirement for supporting the scalability of resources in IoT environments.
Abhijeet Thakare, Young-Gab Kim
doaj   +1 more source

Home - About - Disclaimer - Privacy