Results 61 to 70 of about 19,147 (192)
Cryptosystem Based on Induced Group Codes
The code C on a group G, induced by the code N on a subgroup H, has the property that for decoding the code C one can use the decoder for the code N.
V. M. Deundyak, Y. V. Kosolapov
doaj +1 more source
Fair Public-Key Cryptosystems [PDF]
We show how to construct public-key cryptosystems that are fair, that is, strike a good balance, in a democratic country, between the needs of the Government and those of the Citizens. Fair public-key cryptosystems guarantee that: (1) the system cannot be misused by criminal organizations and (2) the Citizens mantarn exactly the same rights to privacy ...
openaire +1 more source
Implementation Security in Quantum Key Distribution
The problem of implementation security in quantum key distribution (QKD) refers to the difficulty of meeting the requirements of mathematical security proofs in real‐life QKD systems. The present work provides a succint review on this topic, focusing on discrete‐variable QKD setups.
Víctor Zapatero +2 more
wiley +1 more source
LightAuth: A Lightweight Sensor Nodes Authentication Framework for Smart Health System
ABSTRACT Counterfeit medical devices pose a threat to patient safety, necessitating a secure device authentication system for medical applications. Resource‐constrained sensory nodes are vulnerable to hacking, prompting the need for robust security measures.
Zain Ul Islam Adil +5 more
wiley +1 more source
A new public key cryptosystem based on IFS [PDF]
Most public key encryption methods suffers from the inability to prove the difficulty of the algorithms, which summarizes under the category of mathematical problems that have inverses which are believed (but not proven) to be hard.
Md. Said, Mohamad Rushdan +1 more
core
A comprehensive survey on software‐defined networking for smart communities
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary +3 more
wiley +1 more source
A New Public-Key Cryptosystem [PDF]
This paper describes a new public-key cryptosystem where the ciphertext is obtained by multiplying the public-keys indexed by the message bits and the cleartext is recovered by factoring the ciphertext raised to a secret power. Encryption requires four multiplications/byte and decryption is roughly equivalent to the generation of an RSA signature.
David Naccache, Jacques Stern
openaire +1 more source
A novel image encryption algorithm has been developed to impart security to the digital color images. ABSTRACT The rapid proliferation of Internet of Things (IoT) devices has underscored the critical need to safeguard the data they store and transmit.
Muhammad Aqeel +6 more
wiley +1 more source
Cryptanalysis of novel extended multivariate public key cryptosystem
The novel extended multivariate public key cryptosystem is a new security enhancement method on multivariate public key cryptosystems,which is proposed by Qiao,et al.A nonlinear invertible transformation was used,named“tame transformation”,on the ...
Xu-yun NIE, Bo LIU, Gang LU, Ting ZHONG
doaj +2 more sources
Blockchain‐Enabled Car Sharing: Enhancing Reliability and Vehicle History Management
The paper addresses the growing demand for cost‐effective transportation solutions amidst rising car ownership expenses by proposing a decentralized car‐sharing and renting platform called Crowd CarLink, leveraging blockchain technology. This platform enables secure recording of vehicle maintenance and lease history while overcoming challenges of ...
Chen Ben Tolila +3 more
wiley +1 more source

