Zobrazeno 1 - 10
of 203
pro vyhledávání: '"Mirosław Kutyłowski"'
Publikováno v:
Applied Sciences, Vol 14, Iss 17, p 7962 (2024)
We consider authenticating multicast messages in the case of extremely narrow communication channels, such as underwater acoustic communication, with devices such as mobile sensors creating a self-organizing autonomous network. Channel characteristic
Externí odkaz:
https://doaj.org/article/ee8c0801e1104608b8465b492de6b09c
Publikováno v:
Bulletin of the Polish Academy of Sciences: Technical Sciences, Vol 69, Iss 4 (2021)
We analyze the Google-Apple exposure notification mechanism designed by the Apple-Google consortium and deployed on a large number of Corona-warn apps. At the time of designing it, the most important issue was time-to-market and strict compliance wit
Externí odkaz:
https://doaj.org/article/d2d46496275f4ec38e3de53c36e0e2b2
Publikováno v:
Computer Standards & Interfaces. 83:103644
Publikováno v:
Fundamenta Informaticae. 169:295-330
Publikováno v:
Computer Security – ESORICS 2021 ISBN: 9783030884277
ESORICS (2)
ESORICS (2)
In this paper we present modifications to the protocols PACE (Password Authenticated Connection Establishment) and PACE CAM (PACE with Chip Authentication Mapping) from International Civil Aviation Organization (ICAO) specification. We show that with
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4960102070f5b04c72e9d46b87b40cfd
https://doi.org/10.1007/978-3-030-88428-4_25
https://doi.org/10.1007/978-3-030-88428-4_25
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030780852
CSCML
CSCML
We propose a modification of the hierarchical-ring-signature scheme, which may be regarded as an extension to a regular ring signature scheme. The scheme is defined over a structure of nodes, where each node is a root of its own tree, and its anonymi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::84d18a9d1fefded0bbee3320a8a94550
https://doi.org/10.1007/978-3-030-78086-9_13
https://doi.org/10.1007/978-3-030-78086-9_13
Publikováno v:
Security of Ubiquitous Computing Systems ISBN: 9783030105907
In this chapter we focus on two important security challenges that naturally emerge for large scale systems composed of cheap devices implementing only symmetric cryptographic algorithms. First, we consider threats due to poor or malicious implementa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e80b7a10276f7583f98bda896b8c87c3
https://doi.org/10.1007/978-3-030-10591-4_1
https://doi.org/10.1007/978-3-030-10591-4_1
Autor:
Lucjan Hanzlik, Mirosław Kutyłowski
Publikováno v:
Security of Ubiquitous Computing Systems ISBN: 9783030105907
This chapter is devoted to the design and implementation of electronic ID (eID) such as ePassports and electronic personal identity documents. We present an overview of existing and emerging concepts, both concerning threats and possible countermeasu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b95ced0f8f02096bd0c6a2495ca5ead5
https://doi.org/10.1007/978-3-030-10591-4_5
https://doi.org/10.1007/978-3-030-10591-4_5
Autor:
Przemysław Kubiak, Mirosław Kutyłowski
Publikováno v:
TrustCom
A recent CSCML'2020 paper by Dolev and Liber presents a low cost blockchain based on cryptographic mechanism. Its main feature is a mechanism discouraging a user to fork a blockchain - if this happens, then a user's secret is leaked and thereby a pro