Results 21 to 30 of about 22,603 (282)
The object of the study is the processes of building groups of symmetric double-operand operations of cryptographic coding of information. The subject of the study are features of the implementation of a generalized method of synthesis groups of ...
Nataliia Lada, Yuliia Rudnytska
doaj +1 more source
A Security Framework for JXTA-Overlay [PDF]
En l'actualitat, la maduresa del camp de la investigació P2P empès a través de nous problemes, relacionats amb la seguretat. Per aquesta raó, la seguretat comença a convertir-se en una de les qüestions clau en l'avaluació d'un sistema P2P, i és important
Arnedo Moreno, Joan +3 more
core +3 more sources
Efficient scalar multiplication of ECC using SMBR and fast septuple formula for IoT
In order to solve the problem between low power of Internet of Things devices and the high cost of cryptography, lightweight cryptography is required. The improvement of the scalar multiplication can effectively reduce the complexity of elliptic curve ...
Chong Guo, Bei Gong
doaj +1 more source
Secure VANET Authentication Protocol (SVAP) Using Chebyshev Chaotic Maps for Emergency Conditions
It is crucial to support emergency applications provided by vehicular adhoc network (VANET) through enabling vehicles to quickly access to the infrastructure and consequently request rescue services.
Roayat I. Abdelfatah +2 more
doaj +1 more source
The Internet of Things (IoT), in spite of its innumerable advantages, brings many challenges namely issues about users' privacy preservation and constraints about lightweight cryptography.
AA Ciss +10 more
core +1 more source
Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks [PDF]
Since the introduction at Crypto'05 by Juels and Weis of the protocol HB+, a lightweight protocol secure against active attacks but only in a detection based-model, many works have tried to enhance its security.
Bringer, Julien, Chabanne, Herve
core +2 more sources
Evaluating the Performance of Lightweight Ciphers in Constrained Environments—The Case of Saturnin
The use of lightweight cryptographic algorithms is essential for addressing security in highly constrained environments such as the Internet of Things. In this paper, the performance of lightweight block ciphers in such highly constrained environments is
Panagiotis Podimatas +1 more
doaj +1 more source
I2PA : An Efficient ABC for IoT [PDF]
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz +2 more
core +3 more sources
A-VIP: Anonymous Verification and Inference of Positions in Vehicular Networks [PDF]
MiniconferenceInternational audienceKnowledge of the location of vehicles and tracking of the routes they follow are a requirement for a number of applications, including e-tolling and liability attribution in case of accidents.
Borgiattino, Carlo +5 more
core +3 more sources
Secure and Efficient Authentication Scheme in IoT Environments
Optimization of resource consumption and decreasing the response time of authentication requests is an immense urgent requirement for supporting the scalability of resources in IoT environments.
Abhijeet Thakare, Young-Gab Kim
doaj +1 more source

