Results 51 to 60 of about 8,161,700 (320)

A formally verified decentralized key management architecture for wireless sensor networks [PDF]

open access: yes, 2003
We present a decentralized key management architecture for wireless sensor networks, covering the aspects of key deployment, key refreshment and key establishment. Our architecture is based on a clear set of assumptions and guidelines.
Pieter H. Hartel   +4 more
core   +6 more sources

Advancing Cryptographic Security With a New Delannoy-Derived Chaotic S-Box

open access: yesIEEE Access
The S-Box (Substitution Box) plays a crucial role in cryptographic security by introducing non-linearity and confusion into the encryption process. It enhances the resistance against cryptanalytic attacks, such as differential and linear cryptanalysis ...
Bayan Alabduallah   +4 more
doaj   +1 more source

A Secure and Efficient Authentication Mechanism Applied to Cognitive Radio Networks

open access: yesIEEE Access, 2017
Cognitive radio (CR) has been introduced to accommodate the steady increment in the spectrum demand. Wireless security in CR network (CRN) is a challenging technical area due to the dynamic and unique characteristics of CRNs.
Mahmoud Khasawneh, Anjali Agarwal
doaj   +1 more source

Symmetric extension in two-way quantum key distribution

open access: yes, 2009
We introduce symmetric extensions of bipartite quantum states as a tool for analyzing protocols that distill secret key from quantum correlations. Whether the correlations are coming from a prepare-and-measure quantum key distribution scheme or from an ...
Andrew C. Doherty   +4 more
core   +1 more source

Tree Parity Machine Rekeying Architectures [PDF]

open access: yes, 2005
The necessity to secure the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e.
Volkmer, Markus, Wallner, Sebastian
core   +5 more sources

Symmetric Key Encryption Based on Rotation-Translation Equation

open access: yesSymmetry, 2020
In this paper, an improved encryption algorithm based on numerical methods and rotation–translation equation is proposed. We develop the new encryption-decryption algorithm by using the concept of symmetric key instead of public key.
B. Stoyanov, Gyurhan H. Nedzhibov
semanticscholar   +1 more source

Owner Specified Excessive Access Control for Attribute Based Encryption

open access: yesIEEE Access, 2016
Attribute-based encryption (ABE) has emerged as a promising solution for access control to diverse set of users in cloud computing systems. Policy can just specify whether (or not) any specific user should be given access to data, but it lacks to provide
Fawad Khan, Hui Li, Liangxuan Zhang
doaj   +1 more source

3D CUBE Algorithm for the Key Generation Method: Applying Deep Neural Network Learning-Based

open access: yesIEEE Access, 2020
Current encryption systems are run with a hybrid mode in which symmetric and asymmetric key methods are mixed. This hybrid mode is devised to employ the fast processing speed of the symmetric key while circumventing the difficulty of providing services ...
Jungha Jin, Keecheon Kim
doaj   +1 more source

Enhanced RC5 Algorithm using Parallel Computing for Communication Networks

open access: yesIngeniería y Ciencia, 2019
One of the main disadvantages of symmetric key algorithms in comparison with asymmetric key ones is their lower security level due to their shorter key length.
David Fabián Cevallos Salas
doaj   +1 more source

Strong wavefront lemma and counting lattice points in sectors

open access: yes, 2007
We compute the asymptotics of the number of integral quadratic forms with prescribed orthogonal decompositions and, more generally, the asymptotics of the number of lattice points lying in sectors of affine symmetric spaces.
A. Eskin   +11 more
core   +1 more source

Home - About - Disclaimer - Privacy