Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








3 Hits in 4.7 sec

Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge

Mayuresh Sunil Pardeshi, Ruey-Kai Sheu, Shyan-Ming Yuan
2022 Sensors  
Therefore, a novel model is designed that is stronger and effective against any kind of unauthorized attack, as IoT devices' vulnerability is on the rise due to the mass production of IoT devices (embedded  ...  Authentication is essential for the prevention of various types of attacks in fog/edge computing.  ...  and HN, the repetition of keys (incrementing value) for authentication, a lack of cryptography, and channel attacks.  ... 
doi:10.3390/s22020607 pmid:35062563 pmcid:PMC8777787 fatcat:euvp6gnsprfvfg2kuz4kstfsdq

Post-Quantum Cryptography [chapter]

Qijun Gu, Pascal Paillier, Tanja Lange, Edlyn Teske, Darrel Hankerson, Alfred Menezes, David Zhang, Feng Yue, Wangmeng Zuo, Jean-Jacques Quisquater, Gildas Avoine, Gerald Brose (+73 others)
2011 Encyclopedia of Cryptography and Security  
Scientists from all over the world gave talks on the state of the art of quantum computers and on cryptographic schemes that may be able to resist attacks by quantum computers.  ...  So, during one of the coffee breaks, we decided to edit a book on this subject. Springer-Verlag promptly agreed to publish such a volume.  ...  Acknowledgements We thank Phong Nguyen and Markus Rückert for helpful discussions on the practical security of lattice-based cryptography.  ... 
doi:10.1007/978-1-4419-5906-5_386 fatcat:ucdkilta7zc3voq7nqctmjkcr4

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+102 others)
2016 International Journal of Network Security   unpublished
The success of these attacks on the proposed mechanism dependence on trust score: lesser trust score (≤ 50) increases the chances of these attacks whereas higher trust score protects the network from these  ...  In this work, a novel approach is designed to secure the RFID-Sensor based MANET that uses ECC for assigning identification to resource constrained mobile nodes.  ...  Acknowledgments The work was sponsored by National Natural Science Foundation of China ( Acknowledgments The authors gratefully acknowledge the anonymous reviewers for their valuable comments.  ... 
fatcat:ez6kvrzkuzg75nulaxycvfvxcq