Results 31 to 40 of about 4,501,528 (307)
Secure MQTT PUF-Based Key Exchange Protocol for Smart Healthcare
Replay and eavesdropping attacks threaten the information security that is held by smart healthcare devices. An authenticated key exchange method to provide cryptography sessions is the best way to provide information security and secure authentication ...
Rizka Reza Pahlevi +2 more
doaj +1 more source
Secure self-calibrating quantum random bit generator [PDF]
Random bit generators (RBGs) are key components of a variety of information processing applications ranging from simulations to cryptography. In particular, cryptographic systems require "strong" RBGs that produce high-entropy bit sequences, but ...
A. Stefanov +9 more
core +2 more sources
Cryptography with chaos at the physical level [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Machado, Romuel F. +2 more
openaire +2 more sources
Security in Quantum Cryptography [PDF]
Quantum cryptography exploits principles of quantum physics for the secure processing of information. A prominent example is secure communication, i.e., the task of transmitting confidential messages from one location to another.
Christopher Portmann, R. Renner
semanticscholar +1 more source
The Case for Quantum Key Distribution [PDF]
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon +20 more
core +8 more sources
MECHANISMS FOR ENSURING THE SECURITY OF CHANNELS OF A PROSPECTIVE MANAGEMENT SYSTEM
The development of military (state) control systems in modern conditions of hybrid warfare requires the possibility of rapid expansion of both functionality and scaling of the physical and logical basis of management, increasing the range of ...
Bogdan Tomashevsky +3 more
doaj +1 more source
Data compression is an important part of information security because compressed data is more secure and easy to handle. Effective data compression technology creates efficient, secure, and easy-to-connect data.
Osama F. Abdel Wahab +3 more
semanticscholar +1 more source
Unconditional security at a low cost [PDF]
By simulating four quantum key distribution (QKD) experiments and analyzing one decoy-state QKD experiment, we compare two data post-processing schemes based on security against individual attack by L\"{u}tkenhaus, and unconditional security analysis by ...
C. H. Bennett +9 more
core +3 more sources
Cloud Computing in the Quantum Era [PDF]
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud.
Kaiiali, Mustafa +2 more
core +2 more sources
Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol
SCADA systems monitor critical industrial, energy and other physical infrastructures in order to detect malfunctions, issue alerts and, in many cases, propose or even take remedial actions.
Despoina Chochtoula +3 more
doaj +1 more source

