Results 61 to 70 of about 640,321 (187)

Strengthening the Authentication Mechanism of Blockchain-Based E-Voting System Using Post-Quantum Cryptography

open access: yesJOIN: Jurnal Online Informatika
Election systems often face severe challenges regarding security and trust. Threats such as vote falsification and lack of transparency in vote counting have shaken the integrity of elections in various countries.
Sonitema Laia, Ari Moesriami Barmawi
doaj   +1 more source

The development of deniable authentication protocol based on the bivariate function hard problem [PDF]

open access: yes, 2016
A deniable authentication protocol enables a receiver to identify the true source of a given message but not to prove the identity of the sender to the third party.
Kamel Ariffin, Muhammad Rezal   +1 more
core  

Attack Detection in Sensor Network Target Localization Systems with Quantized Data

open access: yes, 2017
We consider a sensor network focused on target localization, where sensors measure the signal strength emitted from the target. Each measurement is quantized to one bit and sent to the fusion center.
Blum, Rick S.   +3 more
core   +1 more source

An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments

open access: yesJournal of King Saud University: Computer and Information Sciences, 2017
In the literature, many three-party authenticated key exchange (3PAKE) protocols are put forwarded to established a secure session key between two users with the help of trusted server. The computed session key will ensure secure message exchange between
S.K. Hafizul Islam   +5 more
doaj   +1 more source

Network security attacks. ARP Poisoning case study [PDF]

open access: yes
Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic.
Luminiţa DEFTA
core  

Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things

open access: yes, 2017
Securing the Internet of Things (IoT) is a necessary milestone toward expediting the deployment of its applications and services. In particular, the functionality of the IoT devices is extremely dependent on the reliability of their message transmission.
Ferdowsi, Aidin, Saad, Walid
core   +1 more source

MITM- and DoS-Resistant PUF Authentication for Industrial WSNs via Sensor-Initiated Registration

open access: yesComputers
Industrial Wireless Sensor Networks (IWSNs) play a critical role in Industry 4.0 environments, enabling real-time monitoring and control of industrial processes.
Ashraf Alyanbaawi
doaj   +1 more source

A Compressive Sensing Based Image Encryption and Compression Algorithm With Identity Authentication and Blind Signcryption

open access: yesIEEE Access, 2020
Recently, a robust and secure image sharing scheme with personal identity information embedded was proposed based on Compressive Sensing, Secret Image Sharing and Diffie-Hellman Agreement. However, there exists a security flaw in this scheme.
Xinyan Li   +4 more
doaj   +1 more source

Man-In-The-Middle Attacks Targeting Quantum Cryptography

open access: yes2025 International Conference on Intelligent Communication Networks and Computational Techniques (ICICNCT)
The development of the Willow quantum chip by Google has sparked significant interest in quantum computing, ushering in a new wave of advancements in the field. As quantum computing technology continues to mature, secure quantum communication has garnered increasing attention.
openaire   +2 more sources

Educational and Laboratory System for Studying Man-in-the-Middle Attacks and Ways to Protect against Them

open access: yesБезопасность информационных технологий, 2018
For the implementation of the Master’s program “Business Continuity and Information Security Maintenance” in the field of specialty 10.04.01 “Information Security”, a software shell of the educational laboratory complex (ELC) designed to study the “Man ...
Alexander B. Sattarov   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy