Zobrazeno 1 - 10
of 126
pro vyhledávání: '"Da-Zhi Sun"'
Publikováno v:
Sensors, Vol 23, Iss 14, p 6559 (2023)
Recently, Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices. The PUF protocol is efficient, because it integrates both the Node-to-Node (N2N) authentication
Externí odkaz:
https://doaj.org/article/69c6130c40754d669bd29806a3b2f5d4
Publikováno v:
Asian Journal of Surgery, Vol 45, Iss 11, Pp 2550-2551 (2022)
Externí odkaz:
https://doaj.org/article/92b2406686664582adf6775635cbbfae
Publikováno v:
IEEE Access, Vol 8, Pp 111265-111277 (2020)
Session Initiation Protocol (SIP) is the most widely used signalling protocol for controlling communication, establishing, maintaining, and terminating sessions on the Internet. However, since sensitive information is often transmitted through open c
Externí odkaz:
https://doaj.org/article/dc597c8919d14c8881bffb50dc36c833
Autor:
Da-Zhi Sun, Yi Mu
Publikováno v:
IEEE Access, Vol 8, Pp 175625-175636 (2020)
For mass surveillance, the algorithm substitution attacks (ASAs) are serious security threats to the symmetric encryption schemes. At CRYPTO 2014, Bellare, Paterson, and Rogaway (BPR) formally developed the security notions of decryptability, undetec
Externí odkaz:
https://doaj.org/article/061222c8acdd4527aa5da417b42c6f04
Autor:
Da-Zhi Sun, Yangguang Tian
Publikováno v:
Mathematics, Vol 10, Iss 22, p 4310 (2022)
Recently, Zerrouki et al. proposed a Physically Unclonable Function (PUF) mutual authentication and session key establishment protocol for IoT (Internet of Things) devices. Zerrouki et al.’s PUF protocol is interesting because it does not require t
Externí odkaz:
https://doaj.org/article/4e00f38b46bd490ea3ae10abbb2448d4
Autor:
Da-Zhi Sun, Yangguang Tian
Publikováno v:
Mathematics, Vol 10, Iss 19, p 3685 (2022)
With the rapid development of cloud computing and mobile networks, more and more application scenarios require a secret group key for secure communication. Group Key Exchange (GKE) protocol provides a secret group key for three or more members. Burme
Externí odkaz:
https://doaj.org/article/4a29d761eea643c6bbec8f17e881de98
Autor:
Da-Zhi Sun
Publikováno v:
Symmetry, Vol 13, Iss 10, p 1952 (2021)
Vinoth et al. proposed an authenticated key agreement scheme for industrial IoT (Internet of Things) applications. Vinoth et al.’s scheme aimed to protect the remote sensing data of industrial IoT devices under hostile environments. The scheme is i
Externí odkaz:
https://doaj.org/article/d1683a7a6d5d4a91bde9b72a7d6c074f
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 15 (2019)
In this article, we introduce a new concept of oblivious transfer with membership verification that allows any legitimate group users to obtain services from a service provider in an oblivious manner. We present two oblivious transfer with membership
Externí odkaz:
https://doaj.org/article/9166a099ab0b418292aa68233170de95
Publikováno v:
Sensors, Vol 19, Iss 15, p 3259 (2019)
Bluetooth low energy devices are very popular in wireless personal area networks. According to the Bluetooth standard specifications, the low energy secure simple pairing (LESSP) protocol is the process by which the pairing devices negotiate the auth
Externí odkaz:
https://doaj.org/article/e577778399c44981af909898f66511dc
Autor:
Da-Zhi Sun, Li Sun
Publikováno v:
Sensors, Vol 19, Iss 5, p 1158 (2019)
Bluetooth is an important technical standard for short-range and low-power wireless communication. The home automation and entertainment (HAE) systems often make use of Bluetooth technology to link different Bluetooth devices and form Bluetooth netwo
Externí odkaz:
https://doaj.org/article/0a514d993529443092384c510f6fb2c0