A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge
2022
Sensors
Therefore, a novel model is designed that is stronger and effective against any kind of unauthorized attack, as IoT devices' vulnerability is on the rise due to the mass production of IoT devices (embedded ...
Authentication is essential for the prevention of various types of attacks in fog/edge computing. ...
and HN, the repetition of keys (incrementing value) for authentication, a lack of cryptography, and channel attacks. ...
doi:10.3390/s22020607
pmid:35062563
pmcid:PMC8777787
fatcat:euvp6gnsprfvfg2kuz4kstfsdq
Post-Quantum Cryptography
[chapter]
2011
Encyclopedia of Cryptography and Security
Scientists from all over the world gave talks on the state of the art of quantum computers and on cryptographic schemes that may be able to resist attacks by quantum computers. ...
So, during one of the coffee breaks, we decided to edit a book on this subject. Springer-Verlag promptly agreed to publish such a volume. ...
Acknowledgements We thank Phong Nguyen and Markus Rückert for helpful discussions on the practical security of lattice-based cryptography. ...
doi:10.1007/978-1-4419-5906-5_386
fatcat:ucdkilta7zc3voq7nqctmjkcr4
Online) International Journal of Network Security is published both in traditional paper form
2016
International Journal of Network Security
unpublished
The success of these attacks on the proposed mechanism dependence on trust score: lesser trust score (≤ 50) increases the chances of these attacks whereas higher trust score protects the network from these ...
In this work, a novel approach is designed to secure the RFID-Sensor based MANET that uses ECC for assigning identification to resource constrained mobile nodes. ...
Acknowledgments The work was sponsored by National Natural Science Foundation of China (
Acknowledgments The authors gratefully acknowledge the anonymous reviewers for their valuable comments. ...
fatcat:ez6kvrzkuzg75nulaxycvfvxcq