Results 21 to 30 of about 2,320 (256)

On the Shannon Perfect Secrecy Result

open access: yes2020 14th International Conference on Signal Processing and Communication Systems (ICSPCS), 2020
Shannon information theoretic approach to perfect security requires equal number of key bits to the information bits. This fact has been studied for decades and known as "Shannon impossibility result". This paper demonstrates that it is feasible to start with a significantly smaller number of key size than the information bits and generate final keys ...
openaire   +2 more sources

Perfect secrecy systems immune to spoofing attacks [PDF]

open access: yesInternational Journal of Information Security, 2012
We present novel perfect secrecy systems that provide immunity to spoofing attacks under equiprobable source probability distributions. On the theoretical side, relying on an existence result for $t$-designs by Teirlinck, our construction method constructively generates systems that can reach an arbitrary high level of security.
openaire   +2 more sources

Secrecy Performance Analysis of Artificial-Noise-Aided Spatial Modulation in the Presence of Imperfect CSI

open access: yesIEEE Access, 2018
The security of information over wireless channels has always been an important aspect of wireless communication research. In this paper, the secrecy performance of a spatial modulated system with an artificial noise is investigated over the Rayleigh ...
Xiangbin Yu   +5 more
doaj   +1 more source

Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes

open access: yesDesigns, Codes and Cryptography, 1996
Shannon showed in his classic theory that if a cipher system provides perfect secrecy the number of keys is greater than the number of messages. In the 1980's Simmons developed the theory of authentication, relating the size of the key space to the probability of deception. In 1990 \textit{M. Walker} [J. Cryptology 2, No.
Mitchell, Chris J   +3 more
openaire   +3 more sources

Cryptobiometrics for the Generation of Cancellable Symmetric and Asymmetric Ciphers with Perfect Secrecy

open access: yesMathematics, 2020
Security objectives are the triad of confidentiality, integrity, and authentication, which may be extended with availability, utility, and control. In order to achieve these goals, cryptobiometrics is essential.
Vicente Jara-Vera   +1 more
doaj   +1 more source

Predicting Loss of Ambulation in Limb Girdle Muscular Dystrophy R9

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Limb girdle muscular dystrophy type R9 (LGMDR9) results from biallelic variants in FKRP. There is limited data to predict loss of ambulation (LOA) among those with LGMDR9. Methods Participants in an ongoing dystroglycanopathy natural history study (NCT00313677) with FKRP variants who had achieved ambulation and were more than 3 ...
Chandra L. Miller   +6 more
wiley   +1 more source

Development of a Prediction Model for Progression Risk in High‐Grade Gliomas Based on Habitat Radiomics and Pathomics

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To investigate the value of constructing models based on habitat radiomics and pathomics for predicting the risk of progression in high‐grade gliomas. Methods This study conducted a retrospective analysis of preoperative magnetic resonance (MR) images and pathological sections from 72 patients diagnosed with high‐grade gliomas (52 ...
Yuchen Zhu   +14 more
wiley   +1 more source

Security-Enhanced Vehicle-to-Roadside Unit Authentication Scheme for Internet of Vehicles

open access: yesMathematics
Secure real-time data interaction between vehicles and transportation infrastructure, such as RSUs (V2R), can achieve intelligent and safe driving, as well as efficient travel services, in Internet of Vehicles (IoV), a secure and efficient V2R ...
Yan Sun, Qi Xie
doaj   +1 more source

Introducing Perfect Forward Secrecy for AN.ON [PDF]

open access: yes, 2010
In this paper we discuss AN.ON's need to provide perfect forward secrecy and show by an estimation of the channel build up time that the straight forward solution is not a practical solution. In the remaining paper we propose an improvement which enables AN.ON to provide perfect forward secrecy with respect to their current attacker model.
Benedikt Westermann, Dogan Kesdogan
openaire   +1 more source

Region‐to‐Region Unidirectional Connection In Vitro Brain Model for Studying Directional Propagation of Neuropathologies

open access: yesAdvanced Functional Materials, EarlyView.
A unidirectional cerebral organoid–organoid neural circuit is established using a microfluidic platform, enabling controlled directional propagation of electrical signals, neuroinflammatory cues, and neurodegenerative disease–related proteins between spatially separated organoids.
Kyeong Seob Hwang   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy