Results 91 to 100 of about 20,376 (274)
Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments. [PDF]
Park Y, Ryu D, Kwon D, Park Y.
europepmc +1 more source
Provable Security Against a Differential Attack
The purpose of this paper is to show that there exist DES-like iterated ciphers, which are provably resistant against differential attacks. The main result on the security of a DES-like cipher with independent round keys is Theorem 1, which gives an upper bound to the probability of <em>s</em>-round differentials, as defined in <em> ...
Nyberg, Kaisa, Knudsen, Lars Ramkilde
openaire +2 more sources
The impacts of biological invasions
ABSTRACT The Anthropocene is characterised by a continuous human‐mediated reshuffling of the distributions of species globally. Both intentional and unintentional introductions have resulted in numerous species being translocated beyond their native ranges, often leading to their establishment and subsequent spread – a process referred to as biological
Phillip J. Haubrock +42 more
wiley +1 more source
An efficient and provably secure key agreement scheme for satellite communication systems. [PDF]
Zhang Y, Zhai Z.
europepmc +1 more source
Early evolutionary history of the seed
ABSTRACT The seed is an essential stage in the life history of gymnospermous and angiospermous plants, facilitating both their survival and dispersal. We reappraise knowledge of the evolutionary history of the gymnospermous seed, from its origin in the late Devonian through to the well‐known end‐Permian extinctions – an interval encompassing the ...
Richard M. Bateman +2 more
wiley +1 more source
Why Provable Security Matters? [PDF]
Recently, methods from provable security, that had been developped for the last twenty years within the research community, have been extensively used to support emerging standards. This in turn has led researchers as well as practitioners to raise some concerns about this methodology.
openaire +1 more source
ABSTRACT This article evaluates the average business performance of construction firms across Spain's 17 autonomous communities within a decentralised governance framework. A regional composite sustainability index is developed, integrating economic, social and environmental intensity indicators.
Francisco José Castillo‐Díaz +3 more
wiley +1 more source
ABSTRACT Although artificial intelligence (AI) is increasingly being touted to assist organizations, AI integration for sustainability efforts has been limited AND sporadic and tends to follow an ad hoc strategy. The existing literature therein focuses on the technological capabilities of AI, overlooking how organizations make sense of and ...
Amanda Balasooriya, Darshana Sedera
wiley +1 more source
Provably secure partially blind signature without trusted PKG
Using gap Diffie-Hellman groups, based partially blind signature scheme, an efficient ID-based partially blind signature scheme without trusted private key generator (PKG) was proposed.
FENG Tao1, PENG Wei1, MA Jian-feng3
doaj +2 more sources
Efficient identification protocol provably secure in standard model
Based on the hardness assumption of the collusion attack algorithm with k traitors (K-CAA) in a gap Diffie-Hellman (GDH) group, a new and efficient identification protocol is proposed.
LI Yan-ping1, WANG Yu-min1
doaj +2 more sources

