Results 51 to 60 of about 13,174 (191)

Linear Cancellations in the MitM Attacks on Sponge Functions

open access: yesIACR Transactions on Symmetric Cryptology
At EUROCRYPT 2023, Qin et al. proposed the MitM attack framework on sponge functions by separating the message bits into two sets of neutral bits.
Lingyue Qin   +5 more
doaj   +1 more source

Recognizing Information Feature Variation: Message Importance Transfer Measure and Its Applications in Big Data

open access: yesEntropy, 2018
Information transfer that characterizes the information feature variation can have a crucial impact on big data analytics and processing. Actually, the measure for information transfer can reflect the system change from the statistics by using the ...
Rui She, Shanyun Liu, Pingyi Fan
doaj   +1 more source

mITm@ch[FotO]Aktion: 17.-22.09.2014

open access: yesMedienimpulse, 2015
Katharina Kaiser-Müller
doaj   +1 more source

Survey and Systematization of Secure Device Pairing

open access: yes, 2017
Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices.
Fomichev, Mikhail   +4 more
core   +1 more source

Mechanisms of Action Involved in the In Vivo Gastroprotective Response of Fruits: A Systematic Review

open access: yesFood Frontiers, Volume 7, Issue 1, January 2026.
ABSTRACT Gastrointestinal diseases remain a significant global health concern, primarily due to the limitations of current pharmacological treatments, which often come with adverse side effects and high recurrence rates. This situation highlights the urgent need for safer and more effective alternatives.
Isabel Sousa Alcântara   +7 more
wiley   +1 more source

Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Fault analysis is a powerful technique to retrieve secret keys by exploiting side-channel information. Differential fault analysis (DFA) is one of the most powerful threats utilizing differential information between correct and faulty ciphertexts and ...
Qingyuan Yu   +6 more
doaj   +1 more source

C3Crowd$C^3Crowd$: Crowd Contributor and Consumer Framework for Secure Crowd Management Using Blockchain

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
The study presents C3Crowd$C^3Crowd$, a blockchain‐based framework designed to enhance security in crowd management through decentralization, cryptography and smart contracts. It uses reputation management and a credit‐based incentive model to encourage user participation while safeguarding sensitive crowd data.
Sukanta Chakraborty, Abhishek Majumder
wiley   +1 more source

Usability Evaluation of a Push‐Based Passwordless Authentication Model Using Public‐Key Cryptography

open access: yesIET Biometrics, Volume 2026, Issue 1, 2026.
Despite major advancements in the sphere of the public‐key authentication specifically in the instances of the newly established standards like WebAuthn and the FIDO2, the practical implementation of the passwordless login systems is still hindered by the usability factors, platform‐related requirements, and the very nature of the deployment process is
Ghulam Mustafa   +6 more
wiley   +1 more source

SKE2SG: A Secure Key Establishment Scheme for Smart Grid Cyber‐Physical Systems Based on Elliptic Curve Cryptography

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley   +1 more source

Cyber-Security in Smart Grid: Survey and Challenges

open access: yes, 2018
Smart grid uses the power of information technology to intelligently deliver energy to customers by using a two-way communication, and wisely meet the environmental requirements by facilitating the integration of green technologies.
Ghazi, Hamid El   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy