Results 51 to 60 of about 409,625 (195)
In this paper, we have proposed a two-party authenticated key establishment (AKE), and authenticated key transport protocols based on lattice-based cryptography, aiming to provide security against quantum attacks for secure communication.
Mani Rajendran +3 more
doaj +1 more source
The fourth industrial revolution (Industry 4.0) is transforming the next generation of the supply chain by making it more agile and efficient compared with the traditional supply chain.
Alireza Esfahani +7 more
doaj +1 more source
Deep Random based Key Exchange protocol resisting unlimited MITM
We present a protocol enabling two legitimate partners sharing an initial secret to mutually authenticate and to exchange an encryption session key. The opponent is an active Man In The Middle (MITM) with unlimited computation and storage capacities. The
CE Shannon +4 more
core +1 more source
The latest developments in the Internet of Medical Things (IoMT) have transformed healthcare, allowing for the easy transmission of sensitive data across networked medical equipment.
Mamta Kumari +2 more
doaj +1 more source
Analysis of Message Attacks in Aviation Data-Link Communication
In aviation communication system, VHF data-link message is used to transmit flight status, airport control instructions as well as the other sensitive information.
Ru Zhang +3 more
doaj +1 more source
Analyzing and Patching SPEKE in ISO/IEC [PDF]
Simple password exponential key exchange (SPEKE) is a well-known password authenticated key exchange protocol that has been used in Blackberry phones for secure messaging and Entrust's TruePass end-to-end web products.
Dong, Changyu +3 more
core +2 more sources
Trust Implications of DDoS Protection in Online Elections
Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider.
Culnane, Chris +3 more
core +1 more source
From Prompts to Motors: Man-in-the-Middle Attacks on LLM-Enabled Vacuum Robots
The integration of large language models (LLMs) into robotic platforms is transforming human–robot interaction by enabling more natural communication and adaptive task execution.
Asif Shaikh, Aygun Varol, Johanna Virkki
doaj +1 more source
Cross-Domain Identity Authentication Scheme Based on Heterogeneous Systems in Hybrid Cloud Environment [PDF]
In the hybrid cloud environment,in order to meet the cross-domain authentication requirements of identity authentication schemes between different cryptosystems,a cross-domain identity authentication scheme based on Public Key Infrastructure(PKI) and ...
JIANG Zetao, SHI Chen
doaj +1 more source
TARN: A SDN-based Traffic Analysis Resistant Network Architecture
Destination IP prefix-based routing protocols are core to Internet routing today. Internet autonomous systems (AS) possess fixed IP prefixes, while packets carry the intended destination AS's prefix in their headers, in clear text.
Barrineau, Geddings +5 more
core +1 more source

