Search
Search Results
-
Card-Based Protocols for Private Set Intersection and Union
Card-based cryptography aims to realize secure multiparty computation with physical cards. This paper is the first to address Private Set...
-
Generalized Bargaining Protocols
Automated Negotiation (AN) is a research field with roots extending back to the mid-twentieth century. There are two dominant AN research directions... -
Efficient integer division computation protocols based on partial homomorphic encryption
In cloud environment, designing the efficient outsourced calculation protocols to serve the machine learning or data mining is a hot topic. At the...
-
The oblivious comparison sorting protocols for secure multi-party computation
Sorting data is a crucial function in many systems, including database systems, because it frequently influences total system performance due to its...
-
Communication Protocols
Machines on their own can do only limited functions. Machines that are not connected and cannot communicate with other machines are simply considered... -
Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations
This paper shows new kinds of card-based cryptographic protocols with a standard deck of cards using private operations. They are multi-party secure...
-
Computer Network Security Protocols
The rapid growth of the Internet and corresponding Internet community has fueled the rapid growth of both individual and business communications... -
Optimization of ProVerif Programs for AKE Protocols
AbstractCryptographic protocols are used to establish secure connection between agents who communicate strictly in accordance with the rules...
-
The Price of Active Security in Cryptographic Protocols
We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting,...
-
Interpreting Network Protocols
Now that we know how to perform the requirements for our packet captures to include the different parameters for the communications as well as the... -
Use of hybrid post-quantum key exchange in internet protocols
This article describes the current situation with incorporating hybrid post-quantum key exchange into the internet security protocols taking TLS 1.3...
-
Simulation of Routing Protocols for IoV in Real-Time Mobility Model Environment
Vehicles in the Internet of Vehicles (IoV) create wireless connections and participate in routing by sending information to other nodes. Despite the...
-
Lower bounds on the state complexity of population protocols
Population protocols are a model of computation in which an arbitrary number of indistinguishable finite-state agents interact in pairs. The goal of...
-
Opportunistic Networks: An Empirical Research of Routing Protocols and Mobility Models
Opportunistic networks (OppNets) are a sub-part of (delay-tolerant networks) DTNs but are quite different from it. OppNets do not need any end-to-end...
-
Designing novel adaptive dynamic event-triggered protocols for uncertain multi-agent systems
This study addressed the cooperative control problem in the presence of uncertainties with constrained interaction and updating. We designed adaptive...
-
Demonstration of new attacks on three healthcare network protocols in a lab environment
Healthcare delivery organizations such as hospitals are complex infrastructures comprising a broad range of networked devices. They include connected...
-
The Asymmetric five-card trick: working with variable encoding in card-based protocols
Recently, card-based protocols have been extensively explored to illustrate relatively complex cryptographic concepts, such as Secure Multiparty...
-
Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication
With the rapid expansion of IoT devices and their applications, there is an increasing demand for efficient and secure authentication mechanisms to...
-
Analysis and Performance Comparison of IoT Message Transfer Protocols Applying in Real Photovoltaic System
The adoption of reliable and real-time communication technology is an absolute necessity for the advancement of Internet of Things (IoT)...
-
Performance assessment and comparison of lightweight D2D-IoT communication protocols over resource constraint environment
The Internet of Things (IoT) based smart strategies are often resource constrained with respect to energy, computation and memory. Outdated...