Articles with "master key" as a keyword



Photo by hudsoncrafted from unsplash

Safeguarding images over insecure channel using master key visual cryptopgraphy

Sign Up to like & get
recommendations!
Published in 2018 at "Ain Shams Engineering Journal"

DOI: 10.1016/j.asej.2018.03.002

Abstract: Abstract Sharing secrets and safeguarding them while being sent over insecure channel is a crucial matter. Visual Cryptography still has the strong potential to secure this critical issue. In this paper, a new master key… read more here.

Keywords: master; master key; key visual; images insecure ... See more keywords
Photo from wikipedia

Transitory Master Key Transport Layer Security for WSNs

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2969050

Abstract: Security approaches in Wireless Sensor Networks (WSNs) are normally based on symmetric cryptography. Instead of symmetric encryption, some alternative approaches have been developed by using public-key cryptography. However, the higher computational cost represents a hard… read more here.

Keywords: key transport; security; transitory master; transport layer ... See more keywords
Photo by lamoune from unsplash

Community engagement; the master key to preventing Nigeria’s obvious pandemic fatigue and the next COVID-19 wave

Sign Up to like & get
recommendations!
Published in 2022 at "Journal of Public Health Research"

DOI: 10.1177/22799036221107061

Abstract: The index case of COVID-19 in Nigeria was in February 2020. The pandemic has resulted in severe social, economic, and public health challenge in Nigeria. Nigeria has experienced pandemic fatigue (PF) characterized by its low… read more here.

Keywords: community engagement; community; covid; pandemic fatigue ... See more keywords