Results 1 to 10 of about 3,071,363 (328)
Private Key and Decoder Side Information for Secure and Private Source Coding [PDF]
We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction.
Onur Günlü+3 more
doaj +6 more sources
Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation [PDF]
This paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node plays the role of either a trusted or untrusted central node, while one legitimate node (Alice) acts as the reference ...
Shiming Fu, Tong Ling, Jun Yang, Yong Li
doaj +3 more sources
Small Private Key MQPKS on an Embedded Microprocessor [PDF]
Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources.
Hwajeong Seo+5 more
doaj +7 more sources
Reminisce: Blockchain Private Key Generation and Recovery Using Distinctive Pictures-Based Personal Memory [PDF]
As a future game-changer in various industries, cryptocurrency is attracting people’s attention. Cryptocurrency is issued on blockchain and managed through a blockchain wallet application.
Jungwon Seo+4 more
doaj +2 more sources
Efficient Quantum Private Comparison without Sharing a Key [PDF]
Quantum private comparison (QPC) allows at least two users to compare the equality of their secret information, for which the security is based on the properties of quantum mechanics.
Jian Li, Fanting Che, Zhuo Wang, Anqi Fu
doaj +2 more sources
Revisiting Small Private Key Attacks on Common Prime RSA [PDF]
This paper revisits small private key attacks on common prime RSA, with a focus on critically analyzing the most recent Mumtaz-Luo’s attack and rectifying its flaws.
Mengce Zheng
doaj +2 more sources
Blockchain Technology – Support for Collaborative Systems [PDF]
Blockchain technology is one of the most promising new technology, a new approach in data registration and distribution, and represents a new paradigm for how information is shared.
Gheorghe MATEI
doaj +1 more source
Blockchain Enabled Anonymous Privacy-Preserving Authentication Scheme for Internet of Health Things
The Internet of Health Things (IoHT) has emerged as an attractive networking paradigm in wireless communications, integrated devices and embedded system technologies.
Arun Sekar Rajasekaran+3 more
doaj +1 more source
Blockchain based system for transfer of funds through an e-Governance application [PDF]
In a democratic country where each and every person’s ideas matter in making decisions calls in the need for a distributed system. Also, transferring money from one system to another within seconds creates demand to be able to view it by each and every ...
Jansi Rani SELLA VELUSWAMI+3 more
doaj +1 more source
In recent years, the Internet of Things (IoT) trend has been adopted very quickly. The rapid growth of IoT has increased the need for physical access control systems (ACS) for IoT devices, especially for IoT devices containing confidential data or other
Wervyan Shalannanda+7 more
doaj +1 more source