Results 101 to 110 of about 32,597 (206)

Knowledge Flow Analysis for Security Protocols

open access: yes, 2005
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this characterization corresponds closely
Devadas, Srinivas   +4 more
core   +1 more source

Solving Degree Bounds for Iterated Polynomial Systems

open access: yesIACR Transactions on Symmetric Cryptology
For Arithmetization-Oriented ciphers and hash functions Gröbner basis attacks are generally considered as the most competitive attack vector. Unfortunately, the complexity of Gröbner basis algorithms is only understood for special cases, and it is ...
Matthias Johann Steiner
doaj   +1 more source

Novel key management and authentication scheme for ad hoc space networks

open access: yesTongxin xuebao, 2006
To be implemented using a flexible distributed architecture consisting of a constellation of dynamically de-ployed or configured satellites that were networked together into an integrated information system,the satellites could form an ad hoc self ...
YANG De-ming, MU De-jun, XU Zhong
doaj   +2 more sources

Enhancing security in IIoT: RFID authentication protocol for edge computing and blockchain-enabled supply chain

open access: yesCyber Security and Applications
This paper addresses security challenges, especially in the authentication mechanism of Industrial Internet of Things (IIoT)-enabled supply chain systems by proposing an enhanced Radio Frequency Identification (RFID) authentication protocol.
Vikash Kumar, Santosh Kumar Das
doaj   +1 more source

Quantum secured blockchain framework for enhancing post quantum data security. [PDF]

open access: yesSci Rep
Reddy NR   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy