Sign Up to like & get
recommendations!
1
Published in 2019 at "Journal of King Saud University - Computer and Information Sciences"
DOI: 10.1016/j.jksuci.2019.10.003
Abstract: Abstract Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256,…
read more here.
Keywords:
provably secure;
polynomial function;
sha;
hash function ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3005592
Abstract: Wireless body area networks (WBANs) and wireless sensor networks (WSNs) are important concepts for the Internet of Things (IoT). They have been applied to various healthcare services to ensure that users can access convenient medical…
read more here.
Keywords:
verification table;
authentication;
laks nvt;
provably secure ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3007623
Abstract: The information and communication technology (ICT) can bring attractive features to the traditional power grid such as energy conserving, reliability, efficiency, transparency, and cost reducing. All of these features can be accomplished with a concept…
read more here.
Keywords:
secure broadcast;
authentication;
security;
smart grid ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3165565
Abstract: In recent years, there has been a lot of research interest in analysing chaotic constructions and their associated cryptographic structures. Compared with the essential combination of encryption and signature, the signcryption scheme has a more…
read more here.
Keywords:
provably secure;
signcryption;
group;
fractional chaotic ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2020.3043358
Abstract: Internet of Things (IoT) consists of numerous smart devices for sharing sensed data through the availability of online services. Direct communication by smart devices with people to identify parameters of healthcare and send them to…
read more here.
Keywords:
technique;
smart devices;
provably secure;
signature technique ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Transactions on Consumer Electronics"
DOI: 10.1109/tce.2020.3035566
Abstract: Universal Serial Bus (USB) is widely used, for example to facilitate hot-swapping and plug-and-play. However, USB ports can be exploited by an adversary to extract private or personal data from the connected devices. Hence, a…
read more here.
Keywords:
usb storage;
two factor;
scheme;
secure two ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2022.3149147
Abstract: Protection of the design intellectual property (IP) has become a pertinent need owing to the globalized integrated circuit (IC) supply chain. Logic locking has been perceived as a holistic solution ensuring protection against multiple supply…
read more here.
Keywords:
tool;
provably secure;
locking techniques;
security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2022.3212174
Abstract: Due to its distributed nature, federated learning is vulnerable to poisoning attacks, in which malicious clients poison the training process via manipulating their local training data and/or local model updates sent to the cloud server,…
read more here.
Keywords:
provably secure;
flcert provably;
federated learning;
secure federated ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2022.3156629
Abstract: The Internet of Things (IoT) has a wide range of applications that influence the life of people expeditiously. In recent years, IoT becomes an emerging technology in a number of fields. Different devices with divergent…
read more here.
Keywords:
provably secure;
industrial internet;
security;
scheme ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Transactions on Information Theory"
DOI: 10.1109/tit.2020.2976073
Abstract: We solve an open question in code-based cryptography by introducing two provably secure group signature schemes from code-based assumptions. Our basic scheme satisfies the CPA-anonymity and traceability requirements in the random oracle model, assuming the…
read more here.
Keywords:
code based;
signature schemes;
provably secure;
group signature ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "PLoS ONE"
DOI: 10.1371/journal.pone.0182894
Abstract: Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes…
read more here.
Keywords:
code based;
provably secure;
identity based;
signature ... See more keywords