We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 1,702 results
  1. Resource allocation problem and artificial intelligence: the state-of-the-art review (2009–2023) and open research challenges

    With the increasing growth of information through smart devices, enhancing the quality of human life necessitates the adoption of various...

    Javad Hassannataj Joloudari, Sanaz Mojrian, ... U. Rajendra Acharya in Multimedia Tools and Applications
    Article 29 January 2024
  2. Cutting the GRASS: Threshold GRoup Action Signature Schemes

    Group actions are fundamental mathematical tools, with a long history of use in cryptography. Indeed, the action of finite groups at the basis of the...
    Michele Battagliola, Giacomo Borin, ... Edoardo Persichetti in Topics in Cryptology – CT-RSA 2024
    Conference paper 2024
  3. Curve-Based Security Schemes for Automating the Encryption and Signing of Digital Documents in Organizational Environments

    Abstract

    Sensitive information in organizations is constantly increasing and at the same sense are the risks of attacks that compromise privacy,...

    M. Morales-Sandoval, H.M. Marin-Castro, J.L. Gonzalez-Compean in Programming and Computer Software
    Article 28 December 2021
  4. Breaking the \(O(\sqrt{n})\)-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party

    Byzantine agreement (BA), the task of n parties to agree on one of their input bits in the face of malicious agents, is a powerful primitive that...

    Elette Boyle, Ran Cohen, Aarushi Goel in Journal of Cryptology
    Article 27 October 2023
  5. Privacy Preserving Image Registration

    Image registration is a key task in medical imaging applications, allowing to represent medical images in a common spatial reference frame. Current...
    Riccardo Taiello, Melek Önen, ... Marco Lorenzi in Medical Image Computing and Computer Assisted Intervention – MICCAI 2022
    Conference paper 2022
  6. Instant-Hybrid Neural-Cryptography (IHNC) based on fast machine learning

    Nowadays, cryptographic systems’ designers are facing significant challenges in their designs. They have to constantly search for new ideas of fast...

    Article Open access 13 July 2022
  7. Security Issues and Solutions for Reliable WBAN-Based e-Healthcare Systems: A Systematic Review

    The advent of wireless communication technologies led to a revolutionary growth in e-healthcare systems. Wireless Body Area Network is one of the...
    Ananya Nandikanti, Kedar Nath Sahu, Sangram Panigrahi in Ambient Intelligence in Health Care
    Conference paper 2023
  8. Develo** Blockchain Learning Lab Experiments for Enhancing Cybersecurity Knowledge and Hands-On Skills in the Cloud

    Blockchain technology has drawn significant attention from academia and industry. Such technology offers unique features and capabilities, including...
    Mohamed Rahouti, Kaiqi **ong, **g Lin in Computer Science and Education
    Conference paper 2023
  9. Verifpal: Cryptographic Protocol Analysis for the Real World

    Verifpal is a new automated modeling framework and verifier for cryptographic protocols, optimized with heuristics for common-case protocol...
    Nadim Kobeissi, Georgio Nicolas, Mukesh Tiwari in Progress in Cryptology – INDOCRYPT 2020
    Conference paper 2020
  10. Enhancing Security in Blockchain Enabled IoT Networks Empowered with zk-SNARKs and Physically Unclonable Functions

    In the realm of IoT and blockchain, security and privacy are paramount. This paper explores the fusion of Zero-Knowledge Succinct Non-Interactive...
    Pranav Unni, Saumya Banerjee, Samia Bouzefrane in Information Security Theory and Practice
    Conference paper 2024
  11. Blind Side Channel Analysis on the Elephant LFSR Extended Version

    The National Institute of Standards and Technology (NIST) started a competition for lightweight cryptography candidates for authenticated encryption....
    Julien Maillard, Awaleh Houssein Meraneh, ... Gaël Thomas in E-Business and Telecommunications
    Conference paper 2023
  12. "Survey and analysis of blockchain technologies with respect to: properties, algorithms, architecture, models, evolution and framework"

    The growing realm of blockchain technology has captivated researchers and practitioners alike with its promise of decentralized, secure, and...

    Nikita Tiwari, Prakash Ranjan, ... Neha Sinha in Multimedia Tools and Applications
    Article 11 June 2024
  13. Differential Cryptanalysis with SAT, SMT, MILP, and CP: A Detailed Comparison for Bit-Oriented Primitives

    SAT, SMT, MILP, and CP, have become prominent in the differential cryptanalysis of cryptographic primitives. In this paper, we review the techniques...
    Emanuele Bellini, Alessandro De Piccoli, ... Andrea Visconti in Cryptology and Network Security
    Conference paper 2023
  14. Crypto-anarchy: a paradigm shift for society and the legal system

    This paper delves into the concept of crypto-anarchy, which has emerged in response to the growing dominance of governments and corporations over...

    Article 23 May 2024
  15. Cryptography-Inspired Federated Learning for Generative Adversarial Networks and Meta Learning

    Federated learning (FL) aims to derive a “better” global model without direct access to individuals’ training data. It is traditionally done by...
    Yu Zheng, Wei Song, ... **uhua Wang in Advanced Data Mining and Applications
    Conference paper 2023
  16. A Signcryption Approach to Address Security and Privacy Issues in Online Gaming Platforms

    Online game has become increasingly popular with people of all ages. But it also poses a number of security and privacy risks and children are...
    Conference paper 2024
  17. A generic framework for blockchain-assisted on-chain auditing for off-chain storage

    In recent times, blockchain-based data auditing protocols have emerged as a cutting-edge area of study. Nevertheless, a conspicuous dearth of a...

    Saeed Banaeian Far, Maryam Rajabzadeh Asaar, Afrooz Haghbin in International Journal of Information Security
    Article 18 April 2024
  18. Reliable Reputation-Based Event Detection in V2V Networks

    Technological advances in automotive and vehicle-to-vehicle communication paradigms promise the implementation of increasingly advanced services to...
    Vincenzo Agate, Alessandra De Paola, ... Antonio Virga in Advanced Research in Technologies, Information, Innovation and Sustainability
    Conference paper 2024
  19. Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm

    Blockchain technology ensures the integrity and transparency of data access control by kee** an unchangeable record of all transactions. Fog...

    Ruchi Agrawal, Saurabh Singhal, Ashish Sharma in Cluster Computing
    Article 06 April 2024
  20. Cryptography: Integrity and Authenticity

    Data integrity can be protected using hash functions, message authentication codes, and digital signatures. These cryptographic mechanisms are...
    Chapter 2022
Did you find what you were looking for? Share feedback.