Zobrazeno 1 - 10
of 180
pro vyhledávání: '"secure protocol"'
Publikováno v:
Symmetry, Vol 16, Iss 7, p 851 (2024)
The rapid development of the Industrial Internet of Things (IIoT) and its application across various sectors has led to increased interconnectivity and data sharing between devices and sensors. While this has brought convenience to users, it has also
Externí odkaz:
https://doaj.org/article/e883a7b08fa644c68685259b20915725
Publikováno v:
Journal of Telecommunications and Information Technology, Vol 1, Iss 1 (2024)
The article proposes a new energy-efficient protocol designed for star topology wireless sensor networks. The protocol has been implemented using ECC, although it can be easily adapted to any algebraic structure, where the discrete logarithm problem
Externí odkaz:
https://doaj.org/article/61292e1f7fb04b1a919353dded677057
Publikováno v:
Frontiers in Physics, Vol 12 (2024)
The socialist millionaires' problem, emanating from the millionaires’ problem, allows two millionaires to determine whether they happen to be equally rich while remaining their riches undisclosed to each other. Most of the current quantum solutions
Externí odkaz:
https://doaj.org/article/fa1c866e7d6148fa86b19140c85ea0fd
Publikováno v:
IEEE Access, Vol 11, Pp 60335-60348 (2023)
The semiconductor supply chain is vulnerable to multiple security attacks, such as hardware Trojan injection, intellectual property theft, and overproduction. The notion of zero-trust (ZT)– never trust, always verify– offers a promising opportuni
Externí odkaz:
https://doaj.org/article/974f9fb2f64f450fb8d07ba267322ef8
Publikováno v:
Applied Sciences, Vol 14, Iss 2, p 835 (2024)
With the development of cloud computing, interest in database outsourcing has recently increased. However, when the database is outsourced, there is a problem in that the information of the data owner is exposed to internal and external attackers. Th
Externí odkaz:
https://doaj.org/article/23a069f002164e948369f23ced1f7b4c
Publikováno v:
IEEE Access, Vol 10, Pp 89696-89713 (2022)
This paper proposes a novel Long-range Wide Area Network (LoRaWAN) session key updating scheme to enhance the security of LoRaWAN with cost-effective communication that provides a unique key for each communication session. The scheme consists of thre
Externí odkaz:
https://doaj.org/article/ea0a156d412841adb1e31cc8fbbd4954
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Zhu Cao
Publikováno v:
New Journal of Physics, Vol 25, Iss 10, p 103027 (2023)
Private function evaluation (PFE) is a task that aims to obtain the output of a function while keeping the function secret. So far its quantum analog has not yet been articulated. In this study, we initiate the study of quantum PFE (QPFE), the quantu
Externí odkaz:
https://doaj.org/article/6c09ff22f1374a329cb4d9cdeb086e1b
Publikováno v:
Tongxin xuebao, Vol 40, Pp 1-9 (2019)
To solve the issue of networking authentication among GEO and LEO satellites in double-layer satellite network,a secure and efficient authenticated key agreement scheme was proposed.Based on symmetric encryption,the proposed scheme can achieve trust
Externí odkaz:
https://doaj.org/article/2b19ccc16a104b6c9c707ba43042791b