Results 61 to 70 of about 640,321 (187)
Election systems often face severe challenges regarding security and trust. Threats such as vote falsification and lack of transparency in vote counting have shaken the integrity of elections in various countries.
Sonitema Laia, Ari Moesriami Barmawi
doaj +1 more source
The development of deniable authentication protocol based on the bivariate function hard problem [PDF]
A deniable authentication protocol enables a receiver to identify the true source of a given message but not to prove the identity of the sender to the third party.
Kamel Ariffin, Muhammad Rezal +1 more
core
Attack Detection in Sensor Network Target Localization Systems with Quantized Data
We consider a sensor network focused on target localization, where sensors measure the signal strength emitted from the target. Each measurement is quantized to one bit and sent to the fusion center.
Blum, Rick S. +3 more
core +1 more source
In the literature, many three-party authenticated key exchange (3PAKE) protocols are put forwarded to established a secure session key between two users with the help of trusted server. The computed session key will ensure secure message exchange between
S.K. Hafizul Islam +5 more
doaj +1 more source
Network security attacks. ARP Poisoning case study [PDF]
Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic.
Luminiţa DEFTA
core
Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things
Securing the Internet of Things (IoT) is a necessary milestone toward expediting the deployment of its applications and services. In particular, the functionality of the IoT devices is extremely dependent on the reliability of their message transmission.
Ferdowsi, Aidin, Saad, Walid
core +1 more source
MITM- and DoS-Resistant PUF Authentication for Industrial WSNs via Sensor-Initiated Registration
Industrial Wireless Sensor Networks (IWSNs) play a critical role in Industry 4.0 environments, enabling real-time monitoring and control of industrial processes.
Ashraf Alyanbaawi
doaj +1 more source
Recently, a robust and secure image sharing scheme with personal identity information embedded was proposed based on Compressive Sensing, Secret Image Sharing and Diffie-Hellman Agreement. However, there exists a security flaw in this scheme.
Xinyan Li +4 more
doaj +1 more source
Man-In-The-Middle Attacks Targeting Quantum Cryptography
The development of the Willow quantum chip by Google has sparked significant interest in quantum computing, ushering in a new wave of advancements in the field. As quantum computing technology continues to mature, secure quantum communication has garnered increasing attention.
openaire +2 more sources
For the implementation of the Master’s program “Business Continuity and Information Security Maintenance” in the field of specialty 10.04.01 “Information Security”, a software shell of the educational laboratory complex (ELC) designed to study the “Man ...
Alexander B. Sattarov +1 more
doaj +1 more source

