We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 843 results
  1. Securing polynomial based group key management scheme against strong active adversary model

    The literature on group key management focuses solely on the security of schemes under passive adversary model. But they lack security against a more...

    Payal Sharma, B. R. Purushothama in International Journal of Information Technology
    Article 06 June 2022
  2. Proving the (In)Security of CRT Based Key Management Schemes Under SAOA Model

    There have been several proposed methods in the literature for securely distributing group keys and managing group dynamics for secure group...

    Payal Sharma, B. R. Purushothama in Wireless Personal Communications
    Article 01 February 2024
  3. Examining Insider-Outsider Dynamics

    Nationality is a category used by Zimbabweans strategically in order to seek self-esteem and positive affirmation as migrants in a foreign land, and...
    Johannes Kögel in Navigating Nationality
    Chapter 2024
  4. The Pre-Shared Key Modes of HPKE

    The Hybrid Public Key Encryption (HPKE) standard was recently published as RFC 9180 by the Crypto Forum Research Group (CFRG) of the Internet...
    Joël Alwen, Jonas Janneck, ... Benjamin Lipp in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  5. Group Key Management Schemes Under Strong Active Adversary Model: A Security Analysis

    A group key management scheme is for a group controller to manage an encryption key for a collection of users to communicate messages among...
    Sarvesh V. Sawant, Gaurav Pareek, B. R. Purushothama in Security in Computing and Communications
    Conference paper 2019
  6. Bitcoin as a Transaction Ledger: A Composable Treatment

    Bitcoin is one of the most prominent examples of a distributed cryptographic protocol that is extensively used in reality. Nonetheless, existing...

    Christian Badertscher, Ueli Maurer, ... Vassilis Zikas in Journal of Cryptology
    Article Open access 04 April 2024
  7. A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System

    The Internet of Things is gaining popularity throughout the world. With the growth of digital communication, healthcare 4.0 are being implemented by...

    Ravi Raushan Kumar Chaudhary, Kakali Chatterjee in Peer-to-Peer Networking and Applications
    Article 27 June 2023
  8. Lessons learned from offline assessment of security-critical systems: the case of microsoft’s active directory

    One of the famous directory services on the market is Active Directory (AD) by Microsoft. It consists of a set of services that work on Windows...

    Article 12 August 2021
  9. Confirming Secure Interoperability in Mobile Financial Services: Challenges of Data Federation and Cryptography-Based Solution

    Mobile Financial Services (MFS) is a very promising and prospering sector in Bangladesh with emerging challenges. Currently, each MFS providers is...
    Razib Hayat Khan, Rakib Ul Haque, ... Mohammad Faisal Uddin in Intelligent Sustainable Systems
    Conference paper 2024
  10. End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness

    In May 2020, Zoom Video Communications, Inc. (Zoom) announced a multi-step plan to comprehensively support end-to-end encrypted (E2EE) group video...
    Yevgeniy Dodis, Daniel Jost, ... Antonio Marcedone in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  11. Security Analysis of Group Key Management Schemes in Wireless Sensor Networks Against IND-SAOA Game

    In the literature, several group key management (GKM) schemes have been proposed and reviewed against passive adversary to analyze the important...

    Payal Sharma, B. R. Purushothama in SN Computer Science
    Article 08 May 2021
  12. Multi-Signatures for Ad-Hoc and Privacy-Preserving Group Signing

    Multi-signatures allow to combine individual signatures from different signers on the same message into a short aggregated signature. Newer schemes...
    Anja Lehmann, Cavit Özbay in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  13. Federated learning for 6G-enabled secure communication systems: a comprehensive survey

    Machine learning (ML) and Deep learning (DL) models are popular in many areas, from business, medicine, industries, healthcare, transportation, smart...

    Deepika Sirohi, Neeraj Kumar, ... Mohammad Hijjii in Artificial Intelligence Review
    Article 12 March 2023
  14. Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication

    The three party authenticated key agreement protocol assists two parties in affirming one another and agreeing on a shared session key with the...

    Uddeshaya Kumar, Manish Garg, Gautam Kaushik in Cluster Computing
    Article 08 January 2024
  15. Authenticated key agreement scheme for IoT networks exploiting lightweight linear algebraic computations

    Internet of Things (IoT) applications consist mainly of a group of small devices with sensing and/ or actuation capabilities, working collaboratively...

    Ajeet Singh, Vikas Tiwari, Appala Naidu Tentu in International Journal of Information Technology
    Article 16 March 2023
  16. Lightweight secure authentication and key agreement technique for smart grid

    In the last decade, complex engineering systems have been made automatic, smart, and intelligent by adding computation, communication, and monitoring...

    Disuja Kumari, Karan Singh in Peer-to-Peer Networking and Applications
    Article 22 December 2023
  17. Data Sharing and Privacy Preserving Access Policy of Cloud Computing Using Security

    People admire the incredible power of cloud computing but cannot fully trust on cloud providers due to the absence of user-to-cloud controllability....
    Dhanashri Kamble, Rajni Patel, Prajakta Deshmukh in Techno-societal 2022
    Conference paper 2024
  18. CASE: A New Frontier in Public-Key Authenticated Encryption

    We introduce a new cryptographic primitive, called Completely Anonymous Signed Encryption (CASE). CASE is a public-key authenticated encryption...
    Shashank Agrawal, Shweta Agrawal, ... Jayesh Singla in Theory of Cryptography
    Conference paper 2023
  19. Robust Rabin Cryptosystem Biometric Privacy Preserving Authentication Technique for IoT Enabled Devices Over Cloud

    With the advent of growing technologies and digitalization, smart factories and healthcare systems in the cloud are more focused towards task-driven...

    Devishree Naidu, Niranjan K. Ray in SN Computer Science
    Article 28 May 2024
  20. From Religious Populism to Civil Religion: a Discourse Analysis of Bolsonaro’s and Lula’s Inaugural and Victory Speeches

    Religion played a major role during the presidential elections in Brazil in 2018 and 2022. Although much has been written about Bolsonaro’s religious...

    Gabriela Mezzanotti, Ole Jakob Løland in International Journal of Latin American Religions
    Article Open access 27 November 2023
Did you find what you were looking for? Share feedback.