Results 21 to 30 of about 1,662,639 (284)
On-Farm Data Security: Practical Recommendations for Securing Farm Data
The growth in the use of Information and Communications Technology (ICT) and Artificial intelligence (AI) has improved the productivity and efficiency of modern agriculture, which is commonly referred to as precision farming.
Mehdi Hazrati, Rozita Dara, Jasmin Kaur
doaj +1 more source
Practically secure Feistel ciphers [PDF]
In this paper we give necessary design principles to be used, when constructing secure Feistel ciphers. We introducee a new concept, <strong> practical security</strong> against linear and differential attacks on Feistel ciphers. We give examples of such Feistel ciphers (practically) resistant to differential attacks, linear attacks and ...
openaire +2 more sources
Source attack of decoy-state quantum key distribution using phase information [PDF]
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many practical QKD systems still suffer from security ...
Chen, Teng-Yun +9 more
core +2 more sources
Asymmetric cryptography and practical security
Since the appearance of public-key cryptography in Diffie-Hellman seminal paper, many schemes have been proposed, but many have been broken. Indeed, for many people, the simple fact that a cryptographic algorithm withstands cryptanalytic attacks for ...
David Pointcheval
doaj +1 more source
Quantum Erasure Cryptography [PDF]
The phenomenon of quantum erasure has long intrigued physicists, but has surprisingly found limited practical application. Here, we propose an erasure-based protocol for quantum key distribution (QKD) that promises inherent security against detector ...
Salih, Hatim
core +3 more sources
A Tale of Resilience: On the Practical Security of Masked Software Implementations
Masking constitutes a provably-secure approach against side-channel attacks. However, recombination effects (e.g., transitions) severely reduce the proven security. Concerning the software domain, CPU microarchitectures encompass techniques improving the
Lorenzo Casalino +3 more
doaj +1 more source
Human Security: Practical Possibilities
The Covid-19 pandemic has exposed a turbulent world of inequality, failing states, crime, violence, racism and authoritarianism. But it has also opened up the practical possibilities of human security – the notion that governments and international institutions take responsibility for the wellbeing of individuals and the communities in which they live,
openaire +3 more sources
MRCC: A Practical Covert Channel Over Monero With Provable Security
Covert channels are designed to protect the communication relationship of the sender and receiver. Traditional covert channels have become insecure due to the continuous improvement of traffic analysis techniques. In this context, there is an urgent need
Zhaozhong Guo +3 more
doaj +1 more source
Practical Schemes For Privacy & Security Enhanced RFID
Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive,
Hoepman, J.H., Joosten, R., Samarati, P.
core +5 more sources
Security: Collective good or commodity? [PDF]
This is the author's accepted manuscript. The final published article is available from the link below. Copyright @ 2008 Sage.The state monopoly on the legitimate use of violence in Europe and North America has been central to the development of security
Briggs, Rachel +43 more
core +2 more sources

