Zobrazeno 1 - 10
of 3 634
pro vyhledávání: '"Provable-Security"'
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-17 (2024)
Abstract Electronic health record (EHR) cloud system, as a primary tool driving the informatization of medical data, have positively impacted both doctors and patients by providing accurate and complete patient information. However, ensuring the secu
Externí odkaz:
https://doaj.org/article/88737a53dbbf4e9886bcc9ba10fc3a4e
Autor:
Chandranan Dhar, Jordan Ethan, Ravindra Jejurikar, Mustafa Khairallah, Eik List, Sougata Mandal
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 2 (2024)
During recent years, research on authenticated encryption has been thriving through two highly active and practically motivated research directions: provable leakage resilience and key- or context-commitment security. However, the intersection of bot
Externí odkaz:
https://doaj.org/article/8e1541836cb34ba290ba0b2e4a2cd773
Publikováno v:
IEEE Access, Vol 12, Pp 78173-78192 (2024)
IoT and Smart devices are typically deployed for real-time applications that need to communicate to the cloud infrastructure for data processing and storage. However, the cloud infrastructure has high network latency, and hence the fog has been intro
Externí odkaz:
https://doaj.org/article/bf9bf49171b346cbbede8b1585046a12
Publikováno v:
Cyber Security and Applications, Vol 1, Iss , Pp 100018- (2023)
Electronic medicine has received more and more attention because of its ability to provide more efficient and better medical services. However, the characteristics of electronic medical networks make them more vulnerable to security threats such as d
Externí odkaz:
https://doaj.org/article/26a5959446674c0381dcde0aa5746bb0
Publikováno v:
Alexandria Engineering Journal, Vol 70, Iss , Pp 411-422 (2023)
The Power Internet of Things (IoT) is a specific application of the IoT in the power grid. The threat existing in the Power IoT mainly comes from the terminal deployed in the open environment, which has the risk of being tampered with and impersonate
Externí odkaz:
https://doaj.org/article/960370f2a9e7487d9648a2adc0de94fc
Autor:
Ping Zhang
Publikováno v:
Mathematics, Vol 12, Iss 7, p 1011 (2024)
COPA, introduced by Andreeva et al., is the first online authenticated encryption (AE) mode with nonce-misuse resistance, and it is covered in COLM, which is one of the final CAESAR portfolios. However, COPA has been proven to be insecure in the rele
Externí odkaz:
https://doaj.org/article/bec041de54544382946054b5d145ff2a
Publikováno v:
IEEE Access, Vol 11, Pp 62955-62969 (2023)
We consider a basic system to securely and remotely control many IoT devices. Specifically, we require that: 1) a system manager broadcasts information to IoT devices, e.g., wireless environment, only the designated devices can identify operations se
Externí odkaz:
https://doaj.org/article/43ef327aa79b4f8484e3aed2df19c59c
Autor:
Georgii Firsov, Alisa Koreneva
Publikováno v:
Современные информационные технологии и IT-образование, Vol 18, Iss 3, Pp 691-701 (2022)
This research purpose is to develop a reduction-based method for analysis of cryptographic properties of block cipher modes of operation in context of full disk encryption (FDE) via provable security technique, to study weaknesses of widely spread am
Externí odkaz:
https://doaj.org/article/8779daff9b074be683523666799cdf10
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 4 (2023)
Incompressibility is a popular security notion for white-box cryptography and captures that a large encryption program cannot be compressed without losing functionality. Fouque, Karpman, Kirchner and Minaud (FKKM) defined strong incompressibility, wh
Externí odkaz:
https://doaj.org/article/ff4106cff73147e89c5175de651ebc5c
Autor:
Ping Zhang
Publikováno v:
Mathematics, Vol 11, Iss 24, p 4888 (2023)
The complexity and isomerization of communication networks have put forth new requirements for cryptographic schemes to ensure the operation of network security protocols. Robust cryptographic schemes have been gradually favored. The robust initializ
Externí odkaz:
https://doaj.org/article/2a9bf5b909354962b66b6bc3e0cf45dd