Results 1 to 10 of about 3,071,363 (328)

Private Key and Decoder Side Information for Secure and Private Source Coding [PDF]

open access: yesEntropy, 2022
We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction.
Onur Günlü   +3 more
doaj   +6 more sources

Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation [PDF]

open access: goldEntropy
This paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node plays the role of either a trusted or untrusted central node, while one legitimate node (Alice) acts as the reference ...
Shiming Fu, Tong Ling, Jun Yang, Yong Li
doaj   +3 more sources

Small Private Key MQPKS on an Embedded Microprocessor [PDF]

open access: yesSensors, 2014
Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources.
Hwajeong Seo   +5 more
doaj   +7 more sources

Reminisce: Blockchain Private Key Generation and Recovery Using Distinctive Pictures-Based Personal Memory [PDF]

open access: goldMathematics, 2022
As a future game-changer in various industries, cryptocurrency is attracting people’s attention. Cryptocurrency is issued on blockchain and managed through a blockchain wallet application.
Jungwon Seo   +4 more
doaj   +2 more sources

Efficient Quantum Private Comparison without Sharing a Key [PDF]

open access: goldEntropy, 2023
Quantum private comparison (QPC) allows at least two users to compare the equality of their secret information, for which the security is based on the properties of quantum mechanics.
Jian Li, Fanting Che, Zhuo Wang, Anqi Fu
doaj   +2 more sources

Revisiting Small Private Key Attacks on Common Prime RSA [PDF]

open access: goldIEEE Access
This paper revisits small private key attacks on common prime RSA, with a focus on critically analyzing the most recent Mumtaz-Luo’s attack and rectifying its flaws.
Mengce Zheng
doaj   +2 more sources

Blockchain Technology – Support for Collaborative Systems [PDF]

open access: yesInformatică economică, 2020
Blockchain technology is one of the most promising new technology, a new approach in data registration and distribution, and represents a new paradigm for how information is shared.
Gheorghe MATEI
doaj   +1 more source

Blockchain Enabled Anonymous Privacy-Preserving Authentication Scheme for Internet of Health Things

open access: yesSensors, 2022
The Internet of Health Things (IoHT) has emerged as an attractive networking paradigm in wireless communications, integrated devices and embedded system technologies.
Arun Sekar Rajasekaran   +3 more
doaj   +1 more source

Blockchain based system for transfer of funds through an e-Governance application [PDF]

open access: yesRevista Română de Informatică și Automatică, 2022
In a democratic country where each and every person’s ideas matter in making decisions calls in the need for a distributed system. Also, transferring money from one system to another within seconds creates demand to be able to view it by each and every ...
Jansi Rani SELLA VELUSWAMI   +3 more
doaj   +1 more source

Smart Card-based Access Control System using Isolated Many-to-Many Authentication Scheme for Electric Vehicle Charging Stations

open access: yesJournal of ICT Research and Applications, 2023
In recent years, the Internet of Things (IoT) trend has been adopted very quickly. The rapid growth of IoT has increased the need for physical access control systems (ACS) for IoT devices, especially for IoT devices containing confidential data or other
Wervyan Shalannanda   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy