Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 1.697
1.
  • New Cryptographic Primitive... New Cryptographic Primitive:Definition,Model and Construction of Ratched Key Exchange
    Feng, Deng-guo Ji suan ji ke xue, 01/2022, Letnik: 49, Številka: 1
    Journal Article
    Odprti dostop

    In traditional cryptography applications, people always assume that the terminal is secure, and the adversary only exists in the communication channel. However, the mainstream malware and system ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
2.
  • Polynomial-Time Solutions o... Polynomial-Time Solutions of Computational Problems in Noncommutative-Algebraic Cryptography
    Tsaban, Boaz Journal of cryptology, 07/2015, Letnik: 28, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    We introduce the linear centralizer method , and use it to devise a provable polynomial-time solution of the Commutator Key Exchange Problem, the computational problem on which, in the passive ...
Celotno besedilo
Dostopno za: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ

PDF
3.
  • A secure authenticated and ... A secure authenticated and key exchange scheme for fog computing
    Chen, Chien-Ming; Huang, Yanyu; Wang, King-Hang ... Enterprise information systems, 10/2021, Letnik: 15, Številka: 9
    Journal Article
    Recenzirano

    Fog computing architecture is used in various environments such as smart manufacturing, vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security challenges of cloud ...
Celotno besedilo
Dostopno za: BFBNIB, GIS, IJS, KISLJ, NUK, PNG, UL, UM, UPUK
4.
  • Adaptive-ID Secure Hierarch... Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles
    ISHIBASHI, Ren; YONEYAMA, Kazuki IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2022
    Journal Article
    Recenzirano

    Hierarchical ID-based authenticated key exchange (HID-AKE) is a cryptographic protocol to establish a common session key between parties with authentication based on their IDs with the hierarchical ...
Celotno besedilo
Dostopno za: NUK, UL, UM
5.
  • A key exchange protocol bas... A key exchange protocol based on the ring Bn(R, P)
    Nasrutdinov, M. F. Učënye zapiski Kazanskogo universiteta. Seriâ Fiziko-matematičeskie nauki, 04/2024, Letnik: 166, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

       A key exchange protocol over a special class of formal matrices B n (R, P) was proposed. The potential of this design for constructing key exchange protocols using suitable associative rings and ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
6.
  • A Modern View on Forward Se... A Modern View on Forward Security
    Boyd, Colin; Gellert, Kai Computer journal, 04/2021, Letnik: 64, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Abstract Forward security ensures that compromise of entities today does not impact the security of cryptographic primitives employed in the past. Such a form of security is regarded as increasingly ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
7.
Celotno besedilo
Dostopno za: NUK, UL, UM
8.
  • SOChain: A Privacy-Preservi... SOChain: A Privacy-Preserving DDoS Data Exchange Service Over SOC Consortium Blockchain
    Yeh, Lo-Yao; Lu, Peggy Joy; Huang, Szu-Hao ... IEEE transactions on engineering management, 11/2020, Letnik: 67, Številka: 4
    Journal Article
    Recenzirano

    IoT devices provide a significant medium for distributed denial-of-service (DDoS) attacks. In 2016, a large-scale DDoS attack, named Dyn, caused massive damage to several well-known companies. One ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
9.
  • Evaluation of Image Cryptog... Evaluation of Image Cryptography by Using Secret Session Key and SF Algorithm
    Kareem Jumaa, Noor; Muhammed Allawy, Abbas Iraqi journal for computers and informatics (Online), 12/2023, Letnik: 49, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    In the unreliable domain of data communication, safeguarding information from unauthorized access is imperative. Given the widespread application of images across various fields, ensuring the ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
10.
  • SAKE: A Symmetric Authentic... SAKE: A Symmetric Authenticated Key Exchange Protocol with Perfect Forward Secrecy for Industrial Internet of Things
    Fan, Qing; Chen, Jianhua; Shojafar, Mohammad ... IEEE transactions on industrial informatics, 09/2022, Letnik: 18, Številka: 9
    Journal Article

    Security in Industrial Internet of Things (IIoT) is of vital importance as there are some cases where IIoT devices collect sensory information for crucial social production and life. Thus, designing ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
1 2 3 4 5
zadetkov: 1.697

Nalaganje filtrov