Results 31 to 40 of about 40,010 (281)
A distributed key establishment scheme for wireless mesh networks using identity-based cryptography [PDF]
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...
Karaoglan, Duygu +4 more
core +1 more source
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups
Secret sharing in user hierarchy represents a challenging area for research. Although a lot of work has already been done in this direc- tion, this paper presents a novel approach to share a secret among a hierarchy of users while overcoming the ...
Naskar, Ruchira, Sengupta, Indranil
core +3 more sources
WEB3.0 technologies on network architectures, distributed ledgers, and decentralized artificial intelligence represents a transformative shift in how data are handled, stored and shared.
SATHYA KRISHNASAMY
doaj +1 more source
Rational-security and fair two-party comparison protocol
Existing secure two-party comparison protocols usually allowed one party (e.g., Alice) to obtain a comparison result first, and then Alice informed the other one (e.g., Bob) of the comparison result.Obviously, if Alice refused or failed to send the ...
Bowen ZHAO +5 more
doaj
Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories
We introduce the concept of cryptographic reduction, in analogy with a similar concept in computational complexity theory. In this framework, class $A$ of crypto-protocols reduces to protocol class $B$ in a scenario $X$, if for every instance $a$ of $A$,
Aravinda, S. +3 more
core +1 more source
Gut microbiome and aging—A dynamic interplay of microbes, metabolites, and the immune system
Age‐dependent shifts in microbial communities engender shifts in microbial metabolite profiles. These in turn drive shifts in barrier surface permeability of the gut and brain and induce immune activation. When paired with preexisting age‐related chronic inflammation this increases the risk of neuroinflammation and neurodegenerative diseases.
Aaron Mehl, Eran Blacher
wiley +1 more source
Biomolecular condensates formed by fused in sarcoma (FUS) are dissolved by high ATP concentrations yet persist in cells. Using a reconstituted system, we demonstrate that valosin‐containing protein (VCP), an AAA+ ATPase, counteracts ATP‐driven dissolution of FUS condensates through its D2 ATPase activity.
Hitomi Kimura +2 more
wiley +1 more source
Obfuscating encrypted threshold signature algorithm and its applications in cloud computing.
Current cloud computing causes serious restrictions to safeguarding users' data privacy. Since users' sensitive data is submitted in unencrypted forms to remote machines possessed and operated by untrusted service providers, users' sensitive data may be ...
Yahong Li +6 more
doaj +1 more source
It is always an attractive topic for researchers that biometric traits are used to represent the identities of users in identity-based cryptography due to their unique and inherent properties.
Xiwei Shan, Lin You, Gengran Hu
doaj +1 more source
Data Confidentiality in Mobile Ad hoc Networks [PDF]
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis.
Al-Bayatti, Ali +3 more
core +2 more sources

