Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Mediterranean Journal of Mathematics"
DOI: 10.1007/s00009-021-01841-2
Abstract: Functional encryption (FE) is an exciting new public key paradigm that provides solutions to most of the security challenges of cloud computing in a non-interactive manner. In the context of FE, inner product functional encryption…
read more here.
Keywords:
post quantum;
public key;
mathbf;
cryptography ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Microsystem Technologies"
DOI: 10.1007/s00542-019-04518-9
Abstract: Increased use of internet demands substantial protection for secret image file from any adversary, specifically during transmission. In the field of cryptography there are two role models: cryptographer and crypt-analyst/attacker. The cryptographer develops techniques to…
read more here.
Keywords:
session key;
session;
cryptography;
image ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2017 at "Journal of Geographical Systems"
DOI: 10.1007/s10109-017-0252-3
Abstract: Abstract As the volume, accuracy and precision of digital geographic information have increased, concerns regarding individual privacy and confidentiality have come to the forefront. Not only do these challenge a basic tenet underlying the advancement…
read more here.
Keywords:
subjects data;
research;
human subjects;
cancer ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2017 at "Cluster Computing"
DOI: 10.1007/s10586-017-0927-z
Abstract: Mobile ad hoc networks (MANETs) are qualified by multi-hop wireless links and resource restrained nodes. Generally, mobile ad hoc networks (MANETs) are susceptible to various attacks like gray hole attack, black hole attack, selective packet…
read more here.
Keywords:
attack;
detection system;
detection;
trust ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2017 at "Cryptography and Communications"
DOI: 10.1007/s12095-017-0269-y
Abstract: As our society becomes ever more dependent on digital technologies, cryptography becomes increasingly important to secure data while it is being stored, transferred and processed. In the field of cryptography there is a strong crossfertilization…
read more here.
Keywords:
research;
trends cryptography;
recent trends;
cryptography ... See more keywords
Photo from academic.microsoft.com
Sign Up to like & get
recommendations!
1
Published in 2018 at "Chinese Journal of Electronics"
DOI: 10.1049/cje.2018.01.017
Abstract: Quantum cryptography (QC) as an important technology to protect the security of the future network communication, has gained extensive attention from both academia and industry in recent years. This paper provides a concise up-to-date review…
read more here.
Keywords:
cryptography;
quantum;
survey quantum;
quantum cryptography ... See more keywords
Photo by goian from unsplash
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2968985
Abstract: Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in the last years and their use has been suggested for numerous applications due to their ability to provide transparency, redundancy and accountability. In the…
read more here.
Keywords:
post quantum;
quantum blockchain;
cryptography;
blockchain ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3115087
Abstract: An important enabler of the Internet of Things (IoT) is the Narrow-Band Internet of Things (NB-IoT) technology, which is a 3GPP standards compliant connectivity solution. Quantum computing, another emerging technological paradigm, promises novel compute opportunities…
read more here.
Keywords:
internet things;
cryptography;
quantum resistant;
location ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3129224
Abstract: The interconnected digital world is generating enormous data that must be secured from unauthorized access. Advancement in technologies and new innovative methods applied by attackers play an instrumental role in breaching data security. Public key…
read more here.
Keywords:
cryptography;
past present;
rsa;
rsa based ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3143210
Abstract: The advent of the Internet of Things (IoT) has revolutionized the way we, as a society, perform different daily tasks, such as healthcare. The Internet of Health Things (IoHT) is an example of the IoT…
read more here.
Keywords:
key generation;
group;
symmetric key;
cryptography ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3195733
Abstract: Since the use of lightweight cryptography for Internet of Things (IoT) security increases, it is necessary to inform significant threats to IoT devices through research on the attacks of lightweight cryptography. This article demonstrates successful…
read more here.
Keywords:
bit;
cryptography;
box attack;
lightweight cryptography ... See more keywords