Results 21 to 30 of about 3,071,363 (328)

Key exchange protocol based on the private key [PDF]

open access: yesAdvances in Intelligent Systems Research, 2015
At present, most existing key exchange protocols for three-party (3pake) are easily attacked by server key disclosure, dictionary attack and so on. This paper analyses the weakness of the previous work , and presents a key exchange for three-party based on the private key .This method can resist common attack through safety analysis, and the efficiency
Wenqian Shang, Tong Yi, Minyong Shi
openaire   +2 more sources

Matrično zasnovan algoritam za skrivanje tekstova i obradu informacija

open access: yesVojnotehnički Glasnik, 2014
Primena diferencijalne geometrije u skrivanju tekstualnih podataka prikazana je u ovom radu. Ta primena predstavlja generalizaciju prethodno predstavljenih metoda. Matrično vrednosne funkcije više promenljivih korišćene su u ovom radu.
Nenad O. Vesić, Dušan J. Simjanović
doaj   +1 more source

A Secure Mobile Banking Using Kerberos Protocol [PDF]

open access: yesEngineering and Technology Journal, 2009
Because the network is an open environment, a lot of care must be taken whentransferring sensitive information especially when related with financial data.
Mohammad N. Abdullah, May T. Abdul-Hadi
doaj   +1 more source

The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation [PDF]

open access: yes, 2014
The problem of simultaneously generating a secret key (SK) and private key (PK) pair among three terminals via public discussion is investigated, in which each terminal observes a component of correlated sources.
Lai, Lifeng   +3 more
core   +1 more source

A distributed key establishment scheme for wireless mesh networks using identity-based cryptography [PDF]

open access: yes, 2010
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...
Karaoglan, Duygu   +4 more
core   +1 more source

Enriching Information Security via Hybrid of New Expand Rivest Shamir Adleman and Data Encryption Standard Cryptosystem

open access: yesJournal of Applied Sciences and Environmental Management, 2023
Cryptography system gives security services ability to protect information from people who are authorized to use it. This research introduces elevated information security system via hybrid of new expand Rivest Shamir Adleman (RSA) and data encryption ...
M. B. Hammawa   +2 more
doaj   +1 more source

Practical private database queries based on a quantum key distribution protocol [PDF]

open access: yes, 2010
Private queries allow a user Alice to learn an element of a database held by a provider Bob without revealing which element she was interested in, while limiting her information about the other elements. We propose to implement private queries based on a
A. Jakoby   +17 more
core   +4 more sources

Secure key from bound entanglement [PDF]

open access: yes, 2005
We characterize the set of shared quantum states which contain a cryptographically private key. This allows us to recast the theory of privacy as a paradigm closely related to that used in entanglement manipulation.
Horodecki, Karol   +3 more
core   +2 more sources

Key-Private Proxy Re-encryption [PDF]

open access: yes, 2009
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as little trust and reveal as little information to the proxy as necessary to allow it to perform its translations. At the very least, the proxy should not be able to learn the keys
ATENIESE, GIUSEPPE   +2 more
openaire   +2 more sources

Bitcoin private key locked transactions [PDF]

open access: yesInformation Processing Letters, 2018
Abstract Bitcoin smart contracts allow the development of new protocols on top of Bitcoin itself. This usually involves the definition of complex scripts, far beyond the requirement of a single signature. In this paper we introduce the concept of private key locked transactions, a novel type of transactions that allows the atomic verification of a ...
Sergi Delgado-Segura   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy