We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 6,327 results
  1. Provable and Practical Security 17th International Conference, ProvSec 2023, Wuhan, China, October 20–22, 2023, Proceedings

    This volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and Practical Security, ProvSec 2023,...

    Mingwu Zhang, Man Ho Au, Yudi Zhang in Lecture Notes in Computer Science
    Conference proceedings 2023
  2. Provable and Practical Security 16th International Conference, ProvSec 2022, Nan**g, China, November 11–12, 2022, Proceedings

    This book constitutes the refereed proceedings of the 16th International Conference on Provable Security, ProvSec 2022, held in Nan**g, China, in...
    Chunpeng Ge, Fuchun Guo in Lecture Notes in Computer Science
    Conference proceedings 2022
  3. Provable secure authentication key agreement for wireless body area networks

    Wireless body area networks (WBANs) guarantee timely data processing and secure information preservation within the range of the wireless access...

    Yuqian Ma, Wenbo Shi, ... Qingfeng Cheng in Frontiers of Computer Science
    Article 23 December 2023
  4. Farasha: A Provable Permutation-Based Parallelizable PRF

    The pseudorandom function Farfalle, proposed by Bertoni et al. at ToSC 2017, is a permutation based arbitrary length input and output PRF. At its...
    Najwa Aaraj, Emanuele Bellini, ... Eugenio Salazar in Selected Areas in Cryptography
    Conference paper 2024
  5. A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid

    With the gradual maturity of Smart Grid (SG), security challenges become the most important issues that need to be addressed urgently. In recent...

    Cong Wang, Peng Huo, ... Yiying Zhang in Computing
    Article Open access 27 June 2023
  6. A collusion-resistant certificateless provable data possession scheme for shared data with user revocation

    Cloud storage service can provide a lot convenience for users to collect, store and share data within a group. However, there are some secure issues,...

    Guang Yang, Lidong Han, ... Fuqun Wang in Cluster Computing
    Article 23 June 2023
  7. Provable Security of  \(\textrm{HADES}\) Structure

    The \(\textrm{HADES}\) design strategy combines...
    Yuan Gao, Chun Guo in Cryptology and Network Security
    Conference paper 2022
  8. Limits in the Provable Security of ECDSA Signatures

    Digital Signatures are ubiquitous in modern computing. One of the most widely used digital signature schemes is...
    Dominik Hartmann, Eike Kiltz in Theory of Cryptography
    Conference paper 2023
  9. New Limits of Provable Security and Applications to ElGamal Encryption

    We provide new results showing that ElGamal encryption cannot be proven CCA1-secure – a long-standing open problem in cryptography. Our result...
    Conference paper 2024
  10. Provable Data Possession (PDP) and Proofs of Retrievability (POR) of Current Big User Data

    A growing trend over the last few years is storage outsourcing, where the concept of third-party data warehousing has become more popular. This trend...

    Ieuan Walker, Chaminda Hewage, Ambikesh Jayal in SN Computer Science
    Article Open access 24 November 2021
  11. Provable and Practical Security 15th International Conference, ProvSec 2021, Guangzhou, China, November 5–8, 2021, Proceedings

    This book constitutes the refereed proceedings of the 15th International Conference on Provable Security, ProvSec 2021, held in Guangzhou, China, in...

    Qiong Huang, Yu Yu in Lecture Notes in Computer Science
    Conference proceedings 2021
  12. Provable Security Analysis of FIDO2

    We carry out the first provable security analysis of the new FIDO2 protocols, the promising FIDO Alliance’s proposal for a standard for passwordless...
    Manuel Barbosa, Alexandra Boldyreva, ... Bogdan Warinschi in Advances in Cryptology – CRYPTO 2021
    Conference paper 2021
  13. Improved Provable Reduction of NTRU and Hypercubic Lattices

    Lattice-based cryptography typically uses lattices with special properties to improve efficiency. We show how blockwise reduction can exploit...
    Henry Bambury, Phong Q. Nguyen in Post-Quantum Cryptography
    Conference paper 2024
  14. Quantum cryptography based cloud security model (QC-CSM) for ensuring cloud data security in storage and accessing

    In recent days, cloud computing is a universal computing and conventional paradigm, in which the resources are provided over the Internet based on...

    K. Sundar, S. Sasikumar, ... S. karthick in Multimedia Tools and Applications
    Article 24 April 2023
  15. Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle

    We study the provable security claims of two NIST Lightweight Cryptography (LwC) finalists, GIFT-COFB and Photon-Beetle, and present several attacks...
    Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu in Applied Cryptography and Network Security
    Conference paper 2022
  16. Cryptanalysis of Short and Provable Secure Lattice-Based Signature Scheme

    Fenghe and Zhenhua proposed a short and provable secure lattice-based signature scheme in the standard model in 2016. Their aim was to construct a...
    Ramakant Kumar, Sahadeo Padhye, Swati Rawal in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2024
  17. Provable user authentication scheme on ECC in multi-server environment

    Authentic communication is an inevitable trend in the fourth industrial revolution. In a city, the convenient administrative formalities should be...

    Toan-Thinh Truong, Minh-Triet Tran, ... Trong-Nguyen Nguyen in The Journal of Supercomputing
    Article 18 July 2022
  18. What, Indeed, is an Achievable Provable Guarantee for Learning-Enabled Safety-Critical Systems

    Machine learning has made remarkable advancements, but confidently utilising learning-enabled components in safety-critical domains still poses...
    Saddek Bensalem, Chih-Hong Cheng, ... **ngyu Zhao in Bridging the Gap Between AI and Reality
    Conference paper 2024
  19. Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability

    Cloud computing provides outsourcing of computing services at a lower cost, making it a popular choice for many businesses. In recent years, cloud...

    Paromita Goswami, Neetu Faujdar, ... Ghanshyam Singh in Journal of Cloud Computing
    Article Open access 15 February 2024
  20. Privacy Protection Multi-copy Provable Data Possession Supporting Data Reliability

    With the development of technology, a massive amount of data continues to emerge, and there is still a strong demand for data storage. Outsourcing...
    Feng Zhang, Bin Wen, ... Wei Zhou in Blockchain and Trustworthy Systems
    Conference paper 2024
Did you find what you were looking for? Share feedback.