Zobrazeno 1 - 10
of 54
pro vyhledávání: '"Kirill Morozov"'
Publikováno v:
Information Sciences. 589:751-769
Publikováno v:
Mathematical Research for Blockchain Economy ISBN: 9783031186783
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::468211a5be5b80b648a03e1e8ba47d98
https://doi.org/10.1007/978-3-031-18679-0_14
https://doi.org/10.1007/978-3-031-18679-0_14
Publikováno v:
2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA).
Publikováno v:
2022 Fourth International Conference on Blockchain Computing and Applications (BCCA).
Publikováno v:
Proceedings of the 19th International Conference on Security and Cryptography.
Publikováno v:
2020 Sixth International Conference on Mobile And Secure Services (MobiSecServ).
Information assurance properties are fundamental in securing emerging computer systems. Maintaining properties like authorization in these systems relies on knowing the protocol being used and the type of device using it. Scenarios like IoT often inc
Publikováno v:
2020 Sixth International Conference on Mobile And Secure Services (MobiSecServ).
Applying protocols to new settings for which they were not originally designed can result in failures and vulnerabilities. This problem becomes particularly severe when security protocols are concerned. As more and more novel technologies such as IoT
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030630942
SecureComm (2)
SecureComm (2)
Selection of a proper elliptic curve is the most important aspect of Elliptic Curve Cryptography (ECC). Security of ECC is based on the Elliptic Curve Discrete Logarithm Problem which is believed to be unsolvable. Some of the well-known elliptic curv
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::99161e26f88234714edef9174d1a35af
https://doi.org/10.1007/978-3-030-63095-9_19
https://doi.org/10.1007/978-3-030-63095-9_19
Publikováno v:
Open Mathematics, Vol 16, Iss 1, Pp 161-167 (2018)
We prove that a variant of the Courtois-Finiasz-Sendrier signature is strongly existentially unforgeable under chosen message attack in the random oracle model, assuming hardness of the Permuted Goppa Syndrome Decoding Problem (also known as the Nied
Publikováno v:
Computers & Security. 69:65-83
Cloud computing allows a cloud user to outsource her data and the related computation to a cloud service provider to save storage and computational cost. This convenient service has brought a shift from the traditional client–server model to DataBa