A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Mixed Symmetric Key and Elliptic Curve Encryption Scheme Used for Password Authentication and Update Under Unstable Network Environment
2017
Journal of Information Hiding and Multimedia Signal Processing
To solve this question, we propose a mixed symmetric key and elliptic curve encryption scheme for password authentication and update. ...
Especially, the above schemes cannot effectively conduct secure password authentication and password update under unstable network environment when user logins remote management. ...
In this paper, we propose a mixed symmetric key and elliptic curve encryption scheme for password authentication and update. ...
dblp:journals/jihmsp/ChangLY17
fatcat:4vevz242qjbt7po7ibvtdrreoq
A Review on Security Issues and Solutions of the Internet of Drones
2022
IEEE Open Journal of the Computer Society
This review analyzes a host of important security technologies with emphases on authentication techniques and blockchain-powered schemes. ...
Since security and privacy are among the foremost challenges for the IoD, in this paper we conduct a comprehensive review on security issues and solutions for IoD security, discussing IoD-related security ...
Many cryptographybased authentication schemes have been proposed for the IoD in the literature. Using elliptic curve cryptography (ECC) and symmetric key primitives, Hussain et al. ...
doi:10.1109/ojcs.2022.3183003
fatcat:z23eh64uczbd3eo3uqtn6ec5we
Malware Analysis in IoT & Android Systems with Defensive Mechanism
2022
Electronics
knowledge regarding keeping hardware and software updated and securing their system with a strong password. ...
The Internet of Things (IoT) and the Android operating system have made cutting-edge technology accessible to the general public. These are affordable, easy-to-use, and open-source technology. ...
The MQTT protocol uses a key policy, whereas MQTT-SN uses an attributebased encryption policy and elliptic curve cryptography to defend MiTM. ...
doi:10.3390/electronics11152354
fatcat:saf2a2bb6rdznkbgdukxb3s4fe
Recent Advances and Challenges in Security and Privacy for V2X Communications
2020
IEEE Open Journal of Vehicular Technology
For security, detailed discussions on cryptography based schemes and trust based schemes are provided. ...
The TA is responsible to preserve all the information of legitimate users, e.g. real ID and location of APs, real ID and reputation scores of OBUs, which will be used to reveal the real identities and ...
After that, vehicles can encrypt the video using the symmetric key and then transmit the encrypted video to the server. ...
doi:10.1109/ojvt.2020.2999885
fatcat:d3ut2edr7jhvvltv6x56snw36u
Leveraging Blockchain Technology for Ensuring Security and Privacy Aspects in Internet of Things: A Systematic Literature Review
2023
Sensors
platform, consensus algorithm, evaluation environment and metrics, future works or open issues (if any), and further notes for consideration. ...
While security, anonymity/data privacy, and smart contract-related features are apparently advantageous for blockchain technologies (BCT), there are challenges in relation to storage capacity/scalability ...
Elliptic Curve Cryptography (ECC) and Physically Unclonable Functions (PUFs) are authentication schemes between system components. ...
doi:10.3390/s23020788
pmid:36679582
pmcid:PMC9867322
fatcat:bsmpqomo7vhaxc57uqdcwpqc7a
Security issues in cloud environments: a survey
2013
International Journal of Information Security
It addresses several key topics, namely vulnerabilities, threats and attacks, proposing a taxonomy for their classification. ...
It also contains a thorough review of the main concepts concerning the security state of cloud environments and discusses several open research topics. ...
Acknowledgements We would like to thank all the anonymous reviewers for constructively criticizing this work. ...
doi:10.1007/s10207-013-0208-7
fatcat:55o67epb6zfspchxuzvuduzr4a
Internet of Things and Blockchain Integration: Security, Privacy, Technical, and Design Challenges
2022
Future Internet
Such an Internet of things environment would require seamless authentication, data protection, stability, attack resistance, ease of deployment, and self-maintenance, among other things. ...
The paper also discusses some of the recommendations for reducing the effects of these challenges. ...
Elliptic Curve Cryptography (ECC) (where cryptographic keys can be generated more efficiently, smaller, and quicker using Elliptic Curve Theory-based PKI), on the other hand, is a significantly lighter ...
doi:10.3390/fi14070216
fatcat:7oy6vc3uhfgnlerfr5lcs7qyey
Fake BTS Attacks of GSM System on Software Radio Platform
2012
Journal of Networks
The third paper, "A Novel Turbo-Based Encryption Scheme Using Dynamic Puncture Mechanism" by Qian Mao and Chuan Qin, proposes a novel encryption method based on Turbo code. ...
Meanwhile, this coding scheme also provides good error correction capability for the encrypted information while it is transmitted in a noisy channel. ...
Until 2001, Boneh and Franklin [5] presented the first practical and provably secure IBE scheme (BF-IBE) using the bilinear pairings on elliptic curves. ...
doi:10.4304/jnw.7.2.275-281
fatcat:3ejjimllcvewjeifopbvhl3zmi
An Empirical Study on System Level Aspects of Internet of Things (IoT)
2020
IEEE Access
The authors would also like to thank the P C Panchariya, Director, CSIR-CEERI, Pilani, for his encouragement and constant support. ...
Acknowledgment The authors would like to thank the Indian National Academy of Engineering (INAE), Gurgaon, and R V College of Engineering (RVCE), Bengaluru, for their financial support. ...
This protocol, developed using the Elliptical Curve Cryptography (ECC) launches the mutual authentication between the tags and the servers.
X. ...
doi:10.1109/access.2020.3029847
fatcat:5nprx4xtbjfnnkyibk6vbeg47m
Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions
[article]
2021
arXiv
pre-print
This survey aims to draw greater attention to the importance of physical security, with a focus on secure key generation and storage as well as secure execution. ...
In this regard, viewing this technology as a resource for honest parties rather than adversaries, it may enhance not only the security, but also the performance of specific cryptographic schemes. ...
DSA (Digital Signature Algorithm) and elliptic curve cryptosystems [Alagic et al. 2019 ]. ...
arXiv:2005.04344v2
fatcat:jstlhwebznfadf5g2zdri4sb6i
Frontmatter
[chapter]
2019
The Internet of Everything
protocol to transmit urgent data Abstract: Sensor network is designed to provide monitoring services especially for natural disaster. ...
Congestion is a very important factor in wireless sensor network (WSN) and also it reduces quality of services. ...
[39, 40] have designed an identity establishment and capabilitybased access control protocol. This scheme uses elliptical curve cryptography for security. ...
doi:10.1515/9783110628517-fm
fatcat:3npfgq3o65f5pdbphf6pi4qn3a
ijair-volume-6-issue-1-vii-january-march-2019 -HINDUSTAN BOOK.pdf
2022
figshare.com
This paper experiments various basic image segmentation techniques for Lung Chest X-Ray images ...
keys for authentication. ...
Secure and privacy preserving keyword search Qin Liu et.al. [1] proposed a secure and privacy-preserving keyword search over the encrypted data for cloud storage applications using Elliptic Curve Cryptography ...
doi:10.6084/m9.figshare.20217722.v1
fatcat:l74ihuqhcvdtjomod3zdwzfniu
Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies
2016
IEEE Communications Surveys and Tutorials
As we show and discuss, many key ideas are likewise applicable in various other fields, so that their impact reaches far beyond Bitcoin itself. ...
In this survey, we unroll and structure the manyfold results and research directions. We start by introducing the Bitcoin protocol and its building blocks. ...
The authors would like to thank Daniel Cagara for the discussions on this topic and for sharing his practical experience. ...
doi:10.1109/comst.2016.2535718
fatcat:xmdaafdgsvc6tam2kzmaeyorta
BIOSIG 2020 - Komplettband
2020
Biometrics and Electronic Signatures
However, the pandemic led to the wide use of face masks, essential to keep the pandemic under control. ...
The effect of wearing a mask on face recognition in a collaborative environment is currently sensitive yet understudied issue. ...
We thank the reviewers for their comments, the authors in [MSK06] for providing us with their codes for reconstructing faces, and NCI Australia for computational resources. ...
dblp:conf/biosig/X20
fatcat:hkqvegujqbatdlopbzclkxdive
Online) International Journal of Network Security is published both in traditional paper form
2016
International Journal of Network Security
unpublished
In performance analysis, it is observed that the Zone Routing Protocol (ZRP) out-performs the other MANET routing protocols in terms of network performance and security for the proposed scheme. ...
In post-quantum cryptosystems, error correcting codes (ECC) help in code based cryptography for lightweight identification , authentication, distance bounding and tag with ownership transfer protocols ...
Acknowledgments This study was supported by the Asia University, under grant No. 98-NSC-02 and 101-ASIA-34. The authors gratefully acknowledge the anonymous reviewers for their valuable comments. ...
fatcat:ez6kvrzkuzg75nulaxycvfvxcq
« Previous
Showing results 1 — 15 out of 54 results