UP - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 1.043
1.
  • Polynomial-Time Solutions o... Polynomial-Time Solutions of Computational Problems in Noncommutative-Algebraic Cryptography
    Tsaban, Boaz Journal of cryptology, 07/2015, Letnik: 28, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    We introduce the linear centralizer method , and use it to devise a provable polynomial-time solution of the Commutator Key Exchange Problem, the computational problem on which, in the passive ...
Celotno besedilo

PDF
2.
  • A secure authenticated and ... A secure authenticated and key exchange scheme for fog computing
    Chen, Chien-Ming; Huang, Yanyu; Wang, King-Hang ... Enterprise information systems, 10/2021, Letnik: 15, Številka: 9
    Journal Article
    Recenzirano

    Fog computing architecture is used in various environments such as smart manufacturing, vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security challenges of cloud ...
Celotno besedilo
3.
  • Adaptive-ID Secure Hierarch... Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles
    ISHIBASHI, Ren; YONEYAMA, Kazuki IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2022
    Journal Article
    Recenzirano

    Hierarchical ID-based authenticated key exchange (HID-AKE) is a cryptographic protocol to establish a common session key between parties with authentication based on their IDs with the hierarchical ...
Celotno besedilo
4.
  • SAKE: A Symmetric Authentic... SAKE: A Symmetric Authenticated Key Exchange Protocol with Perfect Forward Secrecy for Industrial Internet of Things
    Fan, Qing; Chen, Jianhua; Shojafar, Mohammad ... IEEE transactions on industrial informatics, 09/2022, Letnik: 18, Številka: 9
    Journal Article

    Security in Industrial Internet of Things (IIoT) is of vital importance as there are some cases where IIoT devices collect sensory information for crucial social production and life. Thus, designing ...
Celotno besedilo
5.
  • A Modern View on Forward Se... A Modern View on Forward Security
    Boyd, Colin; Gellert, Kai Computer journal, 04/2021, Letnik: 64, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Abstract Forward security ensures that compromise of entities today does not impact the security of cryptographic primitives employed in the past. Such a form of security is regarded as increasingly ...
Celotno besedilo

PDF
6.
Celotno besedilo
7.
  • SOChain: A Privacy-Preservi... SOChain: A Privacy-Preserving DDoS Data Exchange Service Over SOC Consortium Blockchain
    Yeh, Lo-Yao; Lu, Peggy Joy; Huang, Szu-Hao ... IEEE transactions on engineering management, 11/2020, Letnik: 67, Številka: 4
    Journal Article
    Recenzirano

    IoT devices provide a significant medium for distributed denial-of-service (DDoS) attacks. In 2016, a large-scale DDoS attack, named Dyn, caused massive damage to several well-known companies. One ...
Celotno besedilo
8.
  • Evaluation of Image Cryptog... Evaluation of Image Cryptography by Using Secret Session Key and SF Algorithm
    Kareem Jumaa, Noor; Muhammed Allawy, Abbas Iraqi journal for computers and informatics (Online), 12/2023, Letnik: 49, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    In the unreliable domain of data communication, safeguarding information from unauthorized access is imperative. Given the widespread application of images across various fields, ensuring the ...
Celotno besedilo
9.
  • Post-Quantum Anonymous One-... Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles
    ISHIBASHI, Ren; YONEYAMA, Kazuki IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2023
    Journal Article
    Recenzirano
    Odprti dostop

    Authenticated Key Exchange (AKE) is a cryptographic protocol to share a common session key among multiple parties. Usually, PKI-based AKE schemes are designed to guarantee secrecy of the session key ...
Celotno besedilo
10.
  • A public and private key im... A public and private key image encryption by modified approach of Vigener cipher and the chaotic maps
    Mir, Umar Hussain; Lone, Parveiz Nazir; Singh, Deep ... The imaging science journal, 01/2023, Letnik: 71, Številka: 1
    Journal Article
    Recenzirano

    The article presents a real-time image encryption using a modified approach of Vigenère cipher and the chaotic maps with an efficient key management. The modification is provided to Vigenère cipher ...
Celotno besedilo
1 2 3 4 5
zadetkov: 1.043

Nalaganje filtrov