We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Card-Based Protocols for Private Set Intersection and Union

    Card-based cryptography aims to realize secure multiparty computation with physical cards. This paper is the first to address Private Set...

    Anastasiia Doi, Tomoki Ono, ... Mitsugu Iwamoto in New Generation Computing
    Article Open access 22 June 2024
  2. Generalized Bargaining Protocols

    Automated Negotiation (AN) is a research field with roots extending back to the mid-twentieth century. There are two dominant AN research directions...
    Conference paper 2024
  3. Efficient integer division computation protocols based on partial homomorphic encryption

    In cloud environment, designing the efficient outsourced calculation protocols to serve the machine learning or data mining is a hot topic. At the...

    Yuhong Sun, Jiatao Wang, Fengyin Li in Cluster Computing
    Article 07 June 2024
  4. The oblivious comparison sorting protocols for secure multi-party computation

    Sorting data is a crucial function in many systems, including database systems, because it frequently influences total system performance due to its...

    Koteswara Rao Ch, Kunwar Singh, Anoop Kumar in Multimedia Tools and Applications
    Article 27 January 2024
  5. Communication Protocols

    Machines on their own can do only limited functions. Machines that are not connected and cannot communicate with other machines are simply considered...
    G. R. Kanagachidambaresan, Bharathi N. in Sensors and Protocols for Industry 4.0
    Chapter 2023
  6. Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations

    This paper shows new kinds of card-based cryptographic protocols with a standard deck of cards using private operations. They are multi-party secure...

    Yoshifumi Manabe, Hibiki Ono in New Generation Computing
    Article 15 June 2024
  7. Computer Network Security Protocols

    The rapid growth of the Internet and corresponding Internet community has fueled the rapid growth of both individual and business communications...
    Joseph Migga Kizza in Guide to Computer Network Security
    Chapter 2024
  8. Optimization of ProVerif Programs for AKE Protocols

    Abstract

    Cryptographic protocols are used to establish secure connection between agents who communicate strictly in accordance with the rules...

    E. M. Vinarskii, A. V. Demakov in Programming and Computer Software
    Article 21 December 2022
  9. The Price of Active Security in Cryptographic Protocols

    We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting,...

    Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss in Journal of Cryptology
    Article Open access 10 July 2024
  10. Interpreting Network Protocols

    Now that we know how to perform the requirements for our packet captures to include the different parameters for the communications as well as the...
    Kevin Cardwell in Tactical Wireshark
    Chapter 2023
  11. Use of hybrid post-quantum key exchange in internet protocols

    This article describes the current situation with incorporating hybrid post-quantum key exchange into the internet security protocols taking TLS 1.3...

    Article 16 March 2024
  12. Simulation of Routing Protocols for IoV in Real-Time Mobility Model Environment

    Vehicles in the Internet of Vehicles (IoV) create wireless connections and participate in routing by sending information to other nodes. Despite the...

    Farhana Ajaz, Mohd Naseem in SN Computer Science
    Article 06 March 2024
  13. Lower bounds on the state complexity of population protocols

    Population protocols are a model of computation in which an arbitrary number of indistinguishable finite-state agents interact in pairs. The goal of...

    Philipp Czerner, Javier Esparza, Jérôme Leroux in Distributed Computing
    Article Open access 15 June 2023
  14. Opportunistic Networks: An Empirical Research of Routing Protocols and Mobility Models

    Opportunistic networks (OppNets) are a sub-part of (delay-tolerant networks) DTNs but are quite different from it. OppNets do not need any end-to-end...

    Khaleel Ahmad, Muneera Fathima, ... Khairol Amali Bin Ahmad in SN Computer Science
    Article 28 August 2023
  15. Designing novel adaptive dynamic event-triggered protocols for uncertain multi-agent systems

    This study addressed the cooperative control problem in the presence of uncertainties with constrained interaction and updating. We designed adaptive...

    Bin Cheng, Bin He in Science China Information Sciences
    Article 22 November 2023
  16. Demonstration of new attacks on three healthcare network protocols in a lab environment

    Healthcare delivery organizations such as hospitals are complex infrastructures comprising a broad range of networked devices. They include connected...

    Guillaume Dupont, Daniel dos Santos, ... Sandro Etalle in Journal of Computer Virology and Hacking Techniques
    Article Open access 24 July 2023
  17. The Asymmetric five-card trick: working with variable encoding in card-based protocols

    Recently, card-based protocols have been extensively explored to illustrate relatively complex cryptographic concepts, such as Secure Multiparty...

    Article Open access 31 August 2023
  18. Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication

    With the rapid expansion of IoT devices and their applications, there is an increasing demand for efficient and secure authentication mechanisms to...

    Firas Hamila, Mohammad Hamad, ... Sebastian Steinhorst in International Journal of Information Security
    Article Open access 25 November 2023
  19. Analysis and Performance Comparison of IoT Message Transfer Protocols Applying in Real Photovoltaic System

    The adoption of reliable and real-time communication technology is an absolute necessity for the advancement of Internet of Things (IoT)...

    Khoa Thi Minh Tran, Anh Xuan Pham, ... Phuc Thi Dang in International Journal of Networked and Distributed Computing
    Article Open access 23 February 2024
  20. Performance assessment and comparison of lightweight D2D-IoT communication protocols over resource constraint environment

    The Internet of Things (IoT) based smart strategies are often resource constrained with respect to energy, computation and memory. Outdated...

    Manasi Mishra, S. R. N. Reddy in Multimedia Tools and Applications
    Article 26 January 2024
Did you find what you were looking for? Share feedback.