Results 101 to 110 of about 32,597 (206)
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this characterization corresponds closely
Devadas, Srinivas +4 more
core +1 more source
Solving Degree Bounds for Iterated Polynomial Systems
For Arithmetization-Oriented ciphers and hash functions Gröbner basis attacks are generally considered as the most competitive attack vector. Unfortunately, the complexity of Gröbner basis algorithms is only understood for special cases, and it is ...
Matthias Johann Steiner
doaj +1 more source
Novel key management and authentication scheme for ad hoc space networks
To be implemented using a flexible distributed architecture consisting of a constellation of dynamically de-ployed or configured satellites that were networked together into an integrated information system,the satellites could form an ad hoc self ...
YANG De-ming, MU De-jun, XU Zhong
doaj +2 more sources
This paper addresses security challenges, especially in the authentication mechanism of Industrial Internet of Things (IIoT)-enabled supply chain systems by proposing an enhanced Radio Frequency Identification (RFID) authentication protocol.
Vikash Kumar, Santosh Kumar Das
doaj +1 more source
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source
Quantum secured blockchain framework for enhancing post quantum data security. [PDF]
Reddy NR +5 more
europepmc +1 more source
Delegated multi-party private set intersections from extendable output functions. [PDF]
Bay A.
europepmc +1 more source
Post-Quantum enhanced Ascon for secure vehicular IoT data integrity. [PDF]
A J B, P K, R K, R M.
europepmc +1 more source

