Showing 321 - 340 results of 378 for search '"Cryptography"', query time: 0.03s Refine Results
  1. 321

    Software defined network implementation of multi-node adaptive novel quantum key distribution protocol by Hardeer Kaur, Jai Sukh Paul Singh

    Published 2024-09-01
    “…For securing communication, a commonly know technique is to use cryptography and public channels. Engineers have been working to create a better and more secure cryptographic system. …”
    Get full text
    Article
  2. 322

    Investigation of Blockchain Technology by Using the Innovative Concepts of Complex Pythagorean Fuzzy Soft Information by Naeem Jan, Jeonghwan Gwak, Younghoon Jeon, Bushra Akram

    Published 2022-01-01
    “…A blockchain is a valuable and proficient type of digital ledger technology that involves of expanding list of records, called blocks, that are strongly connected simultaneously using cryptography. Further, complex Pythagorean fuzzy sets (CPFSs) are the generalized form of the intuitionistic fuzzy sets (IFSs), Pythagorean fuzzy sets (PyFSs), and complex intuitionistic fuzzy sets (CIFSs), used for evaluating the awkward and unreliable information in genuine life problems. …”
    Get full text
    Article
  3. 323

    Construction of Mutually Orthogonal Graph Squares Using Novel Product Techniques by A. El-Mesady, Omar Bazighifan

    Published 2022-01-01
    “…Mutually orthogonal graph squares are an area of combinatorial design theory that has many applications in optical communications, wireless communications, cryptography, storage system design, algorithm design and analysis, and communication protocols, to mention just a few areas. …”
    Get full text
    Article
  4. 324

    Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks by Imanishimwe Jean de Dieu, Nyirabahizi Assouma, Maniraguha Muhamad, Wang Jin, Sungyoung Lee

    Published 2012-04-01
    “…To overcome the limitation caused by the symmetric key cryptography algorithms for securing data in WSNs, we proposed a mechanism for checking data integrity in a balanced energy network backbone. …”
    Get full text
    Article
  5. 325

    Responsibility for administrative delicts within banking operations by M. Yu. Bukreev

    Published 2018-11-01
    “…The author names specific features that are inherent for administrative responsibility within banking operations, namely: small public harm is based on normative, factual and procedural grounds, has negative consequences for delinquency, is accompanied by public condemnation of delicts, does not involve cryptography. It has been concluded that administrative responsibility for delicts within banking operations is the application of enforcement action for a delinquent offender (an individual or a legal entity) for the violation of banking legislation by the National Bank of Ukraine that are stipulated by the relevant administrative and legal norm. …”
    Get full text
    Article
  6. 326

    Legal Certainty Regarding the Conversion of Land Certificates To An Electronic System Based On Security Principles by H Holla, Rafi Salhi, Clarissa Oktaviriya Prakoso

    Published 2024-11-01
    “…The benefits for the community from electronic certificates are that there is guaranteed legal certainty and it reduces land certificate disputes because the electronic certificate security system already uses encryption technology such as cryptography. KEYWORDS: Security Guarantee, Electronic Land Certificate…”
    Get full text
    Article
  7. 327

    Low-Cost and Secure Communication System for SCADA System of Remote Microgrids by Amjad Iqbal, M. Tariq Iqbal

    Published 2019-01-01
    “…Communication security has been achieved by implementing AES cryptography. Data authenticity has been achieved by introducing a unique message authentication code (MAC) for each message. …”
    Get full text
    Article
  8. 328

    Efficient authentication scheme for cross-trust domain of IoV based on double-layer shard blockchain by Xuejiao LIU, Qiang ZHONG, Yingjie XIA

    Published 2023-05-01
    “…To solve the problems of poor scalability, slow synchronization of authentication information, and high authentication overhead in cross-trust domain message authentication in the Internet of vehicles (IoV), an efficient authentication scheme for cross-trust domain of IoV based on a double-layer shard blockchain was proposed.A double-layer shard blockchain architecture was designed for lots of cross-trust domain message authentication by constructing blockchains on different entity levels in all domains to improve the scalability of the system and ensure secure and efficient sharing of cross-domain information.A blockchain sharding method based on the Metis graph partitioning algorithm for IoV was proposed to balance loads of each shard and adapt to the uneven distribution of authentication information on different road segments in IoV, thereby improving the efficiency of synchronizing a large number of authentication information on the chain.A batch authentication scheme based on certificateless public-key cryptography (CL-PKC) was proposed, which reduced the authentication overhead of cross-domain messages by enabling batch authentication of messages from different trust domains.Experimental results show that the proposed scheme effectively improves the authentication efficiency of cross-trust domain messages.Compared with other schemes, the proposed scheme reduces the computational overhead of a large number of cross-domain message authentication by more than 26.4%.…”
    Get full text
    Article
  9. 329

    Lightweight Block and Stream Cipher Algorithm: A Review by Suaad Ali Abead, Nada Hussein M. Ali

    Published 2024-06-01
    “…Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  …”
    Get full text
    Article
  10. 330

    The Critique of Aliat Al-Tawil Al - Simiaee by Mohsen Seifi, Elham Baboli Bahmeh

    Published 2021-04-01
    “…The results of the study indicate that this work has been very successful in the first three chapters in the field of metaphor and cryptography as two tools of semiotics and has provided good analyzes by selecting appropriate poetic examples. …”
    Get full text
    Article
  11. 331

    Reusable and robust fuzzy extractor for CRS-dependent sources by Yucheng Ma, Peisong Shen, Xue Tian, Kewei Lv, Chi Chen

    Published 2025-01-01
    “…Our construction is built upon some well-studied cryptography, including a collision resistant hash function, a symmetric key encryption that keeps secure with respect to auxiliary input, a public key encryption and simulation-sound non-interactive zero-knowledge argument. …”
    Get full text
    Article
  12. 332

    Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments by Mohammed A. Aleisa

    Published 2025-01-01
    “…To enable privacy-preserving authentication, access control, and secure communication, the framework integrates blockchain technology with Zero Trust Architecture (ZTA) and post-quantum cryptography. A hybrid Reinforcement-Lattice Blockchain KeyGen for quantum-resilient key generation, Deep Q-Network Multi-Factor Secure Key (DQN-MFSK) for dynamic selection of keys, and Zero-Knowledge Proof for privacy-preserving signatures are employed to achieve secure IoT settings. …”
    Get full text
    Article
  13. 333

    Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing. by Sultan H Almotiri

    Published 2024-01-01
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
    Get full text
    Article
  14. 334

    RAM-MEN: Robust authentication mechanism for IoT-enabled edge networks by Muhammad Tanveer, Saud Alhajaj Aldossari

    Published 2025-01-01
    “…This paper introduces a novel lightweight AM, called RAM-MEN that employs cryptography and physically unclonable functions (PUFs) to secure IoT-enabled MEC environments in the 6G era. …”
    Get full text
    Article
  15. 335

    The impact of digital technologies on the information potential of accounting (financial) statements. Part 2: Impact of digital platforms and models on transparency of corporate re... by M. T. Turmanov, T. M. Rogulenko

    Published 2022-09-01
    “…The use in the course of the study of general scientific methods of analysis and synthesis, as well as methods of logical comparison, reduction and selection of methodologically important facts of reality, made it possible to conclude that in legal terms, the electronic form of existence of objects, objects, processes is legitimized, and the digital form is a deep care into the virtual world through cryptography, the use of complex systems, encryption code and a limited number of participants. …”
    Get full text
    Article
  16. 336

    Anonymous group key distribution scheme for the internet of vehicles by Zhiwang HE, Huaqun WANG

    Published 2023-10-01
    “…Vehicular ad hoc networks (VANET) play a crucial role in intelligent transportation systems by providing driving information and services such as collision prevention and improved traffic efficiency.However, when a trusted third party (TTP) interacts with a vehicle in VANET, it can be vulnerable to security threats like eavesdropping, tampering, and forgery.Many existing schemes rely heavily on TTP for key negotiation to establish session keys and ensure session security.However, this over-reliance on TTP can introduce a single point of failure and redundancy issues when TTP sends the same information to multiple vehicles.Additionally, key negotiation methods used for creating group session keys often result in increased interaction data and interaction times.An anonymous group key distribution scheme for the internet of vehicles was proposed to address these challenges.The Road Side Units (RSUs) were used to facilitate the creation of group session keys among multiple vehicles.Identity-based public key cryptography and an improved multi-receiver encryption scheme were utilized for communication between RSUs and vehicles, enabling two-way authentication and secure distribution of group session keys.During the key distribution process, a single encryption operation was sufficient to allow all group members to obtain a consistent session key.This reduced the reliance on TTP for authentication and group communication.Formal security proofs demonstrate that the proposed scheme satisfies basic security requirements.Furthermore, performance analysis and comparisons indicate that this scheme offers lower computational overhead and communication overhead compared to similar schemes.…”
    Get full text
    Article
  17. 337

    A Novel Scheme for Construction of S-Box Using Action of Power Associative Loop and Its Applications in Text Encryption by Muhammad Asif, Sayeda Wajiha, Sameh Askar, Hijaz Ahmad

    Published 2024-01-01
    “…Substitution boxes (S-boxes) play an important role in symmetric key cryptography because they add complexity and resist cryptanalysis, improving the overall security of encrypted data. …”
    Get full text
    Article
  18. 338

    Post quantum proxy signature scheme based on the multivariate public key cryptographic signature by Jiahui Chen, Jie Ling, Jianting Ning, Emmanouil Panaousis, George Loukas, Kaitai Liang, Jiageng Chen

    Published 2020-04-01
    “…Due to less proxy signature schemes in the post-quantum cryptography aspect, in this article, we investigate the proxy signature in the post-quantum setting so that it can resist against the potential attacks from the quantum adversaries. …”
    Get full text
    Article
  19. 339

    Quantum algorithms for enhanced educational technologies by Basil Hanafi, Mohammad Ali, Devyaani Singh

    Published 2025-01-01
    “…Modern quantum algorithms like Grover’s Algorithm and Quantum Annealing support various functionalities like rapidity in processing as well as instantaneous flexibility towards customization of learning resources for the students and proper optimization of the learning trail. Also, quantum cryptography provides reliable security and prevention against future attacks on cyber security hence providing safe means of transferring educational data. …”
    Get full text
    Article
  20. 340

    Private-preserving scientific computation of the rational numbers by Xuhong LIU, Chen SUN

    Published 2022-06-01
    “…As a fundamental part of cryptography, secure multiparty computation (SMC) is a building block of various cryptographic protocols, and it is also a hot topic in the international cryptographic community.In recent years, many SMC problems, such as secret information comparison, secret set problems and secure multiparty computational geometry, have been widely studied.As many practical problems need to be described by rational numbers, it is both theoretically and practically important to study the SMC problems in the rational number field.However, most of the existing researches focus on integers and the studied data are mainly one-dimensional data.There are few researches on secure multiparty computation of multi-dimensional data in the rational number field, but they can’t be generalized.Based on the fractional representation of rational numbers, the new encoding schemes about rational numbers and rational number vectors were proposed, which could encode multi-dimensional data in the rational number field and provided new solutions for other SMC problems in the rational number field.Based on the encoding scheme and one-way hash function, some protocols were designed for equality problems and set problems in the rational number field.These protocols used basic arithmetic operation and hash operation to guarantee efficiency than existing related protocols.And these protocols didn’t limit the range of research data and they were more widely applicable.It proves that these protocols are secure in the semi-honest model using simulation paradigm, and demonstrates the efficiency and the applicability of these protocols by theoretical analysis and experiment.A practical example was also given to illustrate that approaches are more versatile, and they could also be directly used to solve some secure multiparty computational geometry problems in the rational number field.…”
    Get full text
    Article