Articles with "secure" as a keyword



Photo from wikipedia

Does sexual cannibalism secure genetic benefits of polyandry in a size-dimorphic spider?

Sign Up to like & get
recommendations!
Published in 2020 at "Behavioral Ecology and Sociobiology"

DOI: 10.1007/s00265-020-02890-5

Abstract: Females mate multiply despite numerous costs. It is well established that polyandry can result in sexual conflict, favoring male adaptations that prevent sperm competition often to the disadvantage of the female. Such adaptations are extreme… read more here.

Keywords: spider; benefits polyandry; sexual cannibalism; cannibalism ... See more keywords
Photo from wikipedia

Blockchain Expansion to secure Assets with Fog Node on special Duty

Sign Up to like & get
recommendations!
Published in 2020 at "Soft Computing"

DOI: 10.1007/s00500-020-04857-0

Abstract: Blockchain expansion is the high priority necessity to improve security. Hacking and other attacks are headway from system innovation and security measures for the cloud architecture. That is why the countermeasure deployed for such attacks… read more here.

Keywords: configuration files; secure; blockchain expansion; secure assets ... See more keywords
Photo from wikipedia

Blockchain-assisted secure image transmission and diagnosis model on Internet of Medical Things Environment

Sign Up to like & get
recommendations!
Published in 2021 at "Personal and Ubiquitous Computing"

DOI: 10.1007/s00779-021-01543-2

Abstract: In recent days, the Internet of Medical Things (IoMT) is commonly employed in different aspects of healthcare applications. Owing to the increasing necessitates of IoT, a huge amount of sensing data is collected from distinct… read more here.

Keywords: secure; internet medical; medical things; model ... See more keywords
Photo by krakenimages from unsplash

Double layer secure secret images sharing scheme for biometrics

Sign Up to like & get
recommendations!
Published in 2021 at "Distributed and Parallel Databases"

DOI: 10.1007/s10619-021-07362-x

Abstract: Biometric strategy is primarily followed for authentication which incorporates the distinct recognition of the individual depending on their physical or behavioral features. Among all the biometrics techniques, ‘Iris scanning’ is touted to be the most… read more here.

Keywords: secure secret; secret sharing; scheme; secure ... See more keywords
Photo from wikipedia

Mobile participatory sensing with strong privacy guarantees using secure probes

Sign Up to like & get
recommendations!
Published in 2019 at "GeoInformatica"

DOI: 10.1007/s10707-019-00389-4

Abstract: Mobile participatory sensing (MPS) could benefit many application domains. A major domain is smart transportation, with applications such as vehicular traffic monitoring, vehicle routing, or driving behavior analysis. However, MPS’s success depends on finding a… read more here.

Keywords: secure; secure probes; mobile participatory; privacy ... See more keywords
Photo from wikipedia

Designing Secure Quantum Key Agreement Protocols Against Dishonest Participants

Sign Up to like & get
recommendations!
Published in 2019 at "International Journal of Theoretical Physics"

DOI: 10.1007/s10773-019-04275-5

Abstract: Quantum key agreement (QKA) aims to negotiate a secure and consistent key among several participants. In this paper, we find that a type of QKA protocol is not secure when a participant is dishonest. He… read more here.

Keywords: key agreement; quantum key; designing secure; secure ... See more keywords
Photo by headwayio from unsplash

Controlled Deterministic Secure Semi-Quantum Communication

Sign Up to like & get
recommendations!
Published in 2021 at "International Journal of Theoretical Physics"

DOI: 10.1007/s10773-021-04797-x

Abstract: A controlled deterministic secure semi-quantum communication protocol based on GHZ-like states is proposed for improving the security of semi-quantum communication. The protocol includes three participants, one is Alice with quantum capabilities who can prepare GHZ-like… read more here.

Keywords: secure; quantum communication; communication; semi quantum ... See more keywords
Photo by tomspentys from unsplash

Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Medical Systems"

DOI: 10.1007/s10916-018-0982-x

Abstract: As Internet of Things (IoT) devices and other remote patient monitoring systems increase in popularity, security concerns about the transfer and logging of data transactions arise. In order to handle the protected health information (PHI)… read more here.

Keywords: remote patient; patient monitoring; secure; smart contracts ... See more keywords
Photo by kattrinnaaaaa from unsplash

A novel quantum scheme for secure two-party distance computation

Sign Up to like & get
recommendations!
Published in 2017 at "Quantum Information Processing"

DOI: 10.1007/s11128-017-1766-9

Abstract: Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure… read more here.

Keywords: computation; secure two; secure; party distance ... See more keywords
Photo by hudsoncrafted from unsplash

Efficient Chosen-Ciphertext Secure Encryption from R-LWE

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-3979-8

Abstract: In order to construct efficient public-key encryption scheme that is secure against adaptive chosen-ciphertext attacks (CCA), an efficient signature scheme and an identity-based encryption (IBE) scheme from the learning with errors over rings are presented… read more here.

Keywords: secure; scheme; chosen ciphertext; encryption ... See more keywords
Photo from wikipedia

1D-Bernoulli Chaos Sequences Based Collaborative-CDMA: A Novel Secure High Capacity CDMA Scheme

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-4287-z

Abstract: Collaborative multi-user transmission and detection is a contemporary technique used for the up-link of code-division multiple access (CDMA). CDMA has contributed much to the field of wireless communication and still addresses many of the capacity… read more here.

Keywords: capacity; cdma; high capacity; secure ... See more keywords