Results 11 to 20 of about 8,161,700 (320)
Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak [PDF]
Efficient authentication and key agreement protocols between two entities are required in many application areas. In particular, for client–server type of architectures, the client is mostly represented by a constrained device and thus highly efficient ...
An Braeken
doaj +3 more sources
PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices [PDF]
With the growing number of heterogeneous resource-constrained devices connected to the Internet, it becomes increasingly challenging to secure the privacy and protection of data.
Daniel A. F. Saraiva +5 more
doaj +3 more sources
There are a few issues related to the existing symmetric encryption models for color image data, such as the key generation and distribution problems. In this paper, we propose a compression-encryption model to solve these problems.
Emy Setyaningsih +2 more
doaj +4 more sources
Symmetric-Key-Based Security for Multicast Communication in Wireless Sensor Networks
This paper presents a new key management protocol for group-based communications in non-hierarchical wireless sensor networks (WSNs), applied on a recently proposed IP-based multicast protocol.
Matthias Carlier +2 more
doaj +4 more sources
Symmetric autocompensating quantum key distribution [PDF]
4 pages, 2 ...
Walton, Zachary D. +4 more
openaire +3 more sources
Symmetric key structural residues in symmetric proteins with beta-trefoil fold. [PDF]
To understand how symmetric structures of many proteins are formed from asymmetric sequences, the proteins with two repeated beta-trefoil domains in Plant Cytotoxin B-chain family and all presently known beta-trefoil proteins are analyzed by structure ...
Jianhui Feng +3 more
doaj +2 more sources
An enhanced symmetric-key based 5G-AKA protocol
J. Munilla, M. Burmester, R. Barco
semanticscholar +3 more sources
Block Ciphers Analysis Based on a Fully Connected Neural Network
With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data
Ali H. Alwan, Ali H. Kashmar
doaj +1 more source
Unmanned aerial vehicles have found applications in fields such as environmental monitoring and the military. Although the collected data in some of these application domains are sensitive, public channels are deployed during the communication process ...
V. Nyangaresi +6 more
semanticscholar +1 more source
Today's digital data transmission over unsecured wired and wireless communication channels is making encryption algorithms an increasingly important tool for securing data and information. Hybrid encryption techniques combine encryption schemes of either
P. Kuppuswamy +4 more
semanticscholar +1 more source

