Results 41 to 50 of about 807,165 (362)

Analysis of the Security of BB84 by Model Checking [PDF]

open access: yes, 2010
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols.
Azizi, Abdelmalek   +2 more
core   +2 more sources

Integrated Protocols to Ensure Security Services in Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Security in current/next generation wireless sensor network (WSN) is challenging, due to its special characteristics and the scarcity of energy, and processing power.
Mohammed Faisal   +2 more
doaj   +1 more source

Status report on the third round of the NIST post-quantum cryptography standardization process

open access: yesRadiotekhnika, 2022
In recent years, there has been steady progress in the creation of quantum computers. If large-scale quantum computers are implemented, they will threaten the security of many widely used public-key cryptosystems.
M.V. Yesina   +2 more
semanticscholar   +1 more source

Providing Authentication & Authorization Mechanisms for Active Service Charging [PDF]

open access: yes, 2002
Active network technology enables fast deployment of new network services tailored to the specific needs of end users, among others features.
Alarcos, Bernardo   +3 more
core   +3 more sources

A Survey on the Quantum Security of Block Cipher-Based Cryptography

open access: yesIEEE Access
The development of quantum computers represents an important advancement in computing, using quantum mechanics to address problems that were previously difficult to solve. This technological advancement poses a challenge for cryptographic systems.
S. E. Bootsma, M. De Vries
doaj   +1 more source

A STUDY OF BILINEAR MAPS IN WIRELESS SENSOR NETWORKS

open access: yesICTACT Journal on Communication Technology, 2017
In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled by symmetric cryptography systems. But, today by introduction of new needs in these networks and their security development, researchers of security and ...
Reza Alimoradi   +2 more
doaj   +1 more source

Mathematically Based Assessment of the Accuracy of Protection of Cardiac Data Realized with the Help of Cryptography and Steganography

open access: yesMathematics, 2022
This paper describes the application of cryptography and steganography in the protection of cardiac databases. The original cardiac data studied were transformed using a Daubechies wavelet transform.
Galya Georgieva-Tsaneva   +2 more
doaj   +1 more source

Symmetric Cryptography

open access: yes, 2020
Contains fulltext : 221056.pdf (Publisher’s version ) (Open Access)
Leander, N.G.   +3 more
openaire   +2 more sources

Secured Fog-Body-Torrent : A Hybrid Symmetric Cryptography with Multi-layer Feed Forward Networks Tuned Chaotic Maps for Physiological Data Transmission in Fog-BAN Environment

open access: yesInternational Journal of Computational and Experimental Science and Engineering
Recently, the Wireless Body Area Networks (WBAN) have become a promising and practical option in the tele-care medicine information system that aids for the better clinical monitoring and diagnosis.
Parvathy S, Packialatha A
semanticscholar   +1 more source

Regular subgroups with large intersection

open access: yes, 2018
In this paper we study the relationships between the elementary abelian regular subgroups and the Sylow $2$-subgroups of their normalisers in the symmetric group $\mathrm{Sym}(\mathbb{F}_2^n)$, in view of the interest that they have recently raised for ...
Aragona, Riccardo   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy