Results 51 to 60 of about 13,174 (191)
Linear Cancellations in the MitM Attacks on Sponge Functions
At EUROCRYPT 2023, Qin et al. proposed the MitM attack framework on sponge functions by separating the message bits into two sets of neutral bits.
Lingyue Qin +5 more
doaj +1 more source
Information transfer that characterizes the information feature variation can have a crucial impact on big data analytics and processing. Actually, the measure for information transfer can reflect the system change from the statistics by using the ...
Rui She, Shanyun Liu, Pingyi Fan
doaj +1 more source
Survey and Systematization of Secure Device Pairing
Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices.
Fomichev, Mikhail +4 more
core +1 more source
ABSTRACT Gastrointestinal diseases remain a significant global health concern, primarily due to the limitations of current pharmacological treatments, which often come with adverse side effects and high recurrence rates. This situation highlights the urgent need for safer and more effective alternatives.
Isabel Sousa Alcântara +7 more
wiley +1 more source
Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers
Fault analysis is a powerful technique to retrieve secret keys by exploiting side-channel information. Differential fault analysis (DFA) is one of the most powerful threats utilizing differential information between correct and faulty ciphertexts and ...
Qingyuan Yu +6 more
doaj +1 more source
The study presents C3Crowd$C^3Crowd$, a blockchain‐based framework designed to enhance security in crowd management through decentralization, cryptography and smart contracts. It uses reputation management and a credit‐based incentive model to encourage user participation while safeguarding sensitive crowd data.
Sukanta Chakraborty, Abhishek Majumder
wiley +1 more source
Usability Evaluation of a Push‐Based Passwordless Authentication Model Using Public‐Key Cryptography
Despite major advancements in the sphere of the public‐key authentication specifically in the instances of the newly established standards like WebAuthn and the FIDO2, the practical implementation of the passwordless login systems is still hindered by the usability factors, platform‐related requirements, and the very nature of the deployment process is
Ghulam Mustafa +6 more
wiley +1 more source
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley +1 more source
Cyber-Security in Smart Grid: Survey and Challenges
Smart grid uses the power of information technology to intelligently deliver energy to customers by using a two-way communication, and wisely meet the environmental requirements by facilitating the integration of green technologies.
Ghazi, Hamid El +3 more
core +1 more source

