We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 716 results
  1. DIDOR: A Decentralized Identifier Based Onion Routing Protocol

    We propose a new communication protocol, called DIDOR, that provides strong anonymity and is based on a decentralized identifier (DID). The proposed...
    Conference paper 2024
  2. Security Analysis of a Multi-secret Sharing Scheme with Unconditional Security

    Harn has introduced a (t, n) threshold secret sharing scheme recently, in which shareholders’ shares are not disclosed in the secret reconstruction...
    Conference paper 2021
  3. Unconditionally secure short key ciphers based on data compression and randomization

    We consider the problem of constructing an unconditionally secure cipher for the case when the key length is less than the length of the encrypted...

    Article 27 February 2023
  4. Two High-Performance Antenna Selection Schemes for Secure SSK Modulation in Intelligent Industrial Wireless Sensing Systems

    Industrial wireless sensor networks (IWSNs) provide intelligent factory management with a new dimension. Reliable intelligent industrial wireless...
    Hui Xu, Benjamin K. Ng, ... Chan-Tong Lam in Big Data Intelligence and Computing
    Conference paper 2023
  5. From Centralized to Decentralized Remote Electronic Voting

    Elections generally involve the simple tasks of counting votes and publishing the final tally to voters. Depending on the election’s scope, these...
    Christian Killer, Bruno Rodrigues, ... Burkhard Stiller in Blockchains
    Chapter 2024
  6. Anonymity and everlasting privacy in electronic voting

    Everlasting privacy protects cryptographic voting systems against the weakening of intractability assumptions on which they may be based. We find...

    Panagiotis Grontas, Aris Pagourtzis in International Journal of Information Security
    Article 15 February 2023
  7. An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain

    With the widespread use of network infrastructures such as 5G and low-power wide-area networks, a large number of the Internet of Things (IoT) device...

    **ngxing Chen, Qingfeng Cheng, ... **angyang Luo in Frontiers of Computer Science
    Article 22 January 2024
  8. Constant-Overhead Unconditionally Secure Multiparty Computation Over Binary Fields

    We study the communication complexity of unconditionally secure multiparty computation (MPC) protocols in the honest majority setting. Despite...
    Antigoni Polychroniadou, Yifan Song in Advances in Cryptology – EUROCRYPT 2021
    Conference paper 2021
  9. Quantum Key Distribution: An Ascendable Mechanism for Cryptographic Key Distribution

    Quantum key distribution (QKD) is a mechanism that works on quantum mechanics principles, which allows communicating users to protect their key...
    P. Anil, Praveen Likhar, Ravi Shankar Yadav in Communication, Networks and Computing
    Conference paper 2021
  10. Dynamic Local Searchable Symmetric Encryption

    In this article, we tackle for the first time the problem of dynamic memory-efficient Searchable Symmetric Encryption (SSE). In the term...
    Brice Minaud, Michael Reichle in Advances in Cryptology – CRYPTO 2022
    Conference paper 2022
  11. A survey on counting-based secret sharing schemes for resource-constrained environments: techniques, security, challenges, and future directions

    Secret sharing schemes play a vital role in securely distributing a secret among multiple participants, ensuring confidentiality and access control....

    Bhawana Parihar, Arjun Singh Rawat, Maroti Deshmukh in The Journal of Supercomputing
    Article 30 April 2024
  12. Quantum Key Distribution in Internet of Things

    This chapter aims to explore the integration of Quantum Key Distribution (QKD) with IoT systems. It delves into the potential benefits, challenges,...
    Chapter 2024
  13. MLS Group Messaging: How Zero-Knowledge Can Secure Updates

    The Messaging Layer Security (MLS) protocol currently developed by the Internet Engineering Task Force (IETF) aims at providing a secure group...
    Julien Devigne, Céline Duguey, Pierre-Alain Fouque in Computer Security – ESORICS 2021
    Conference paper 2021
  14. Fundamentals of Quantum Key Distribution

    Establishing secure cryptographic keys through an untrusted network is a fundamental cryptographic task. While the use of public key infrastructure...
    Miralem Mehic, Stefan Rass, ... Miroslav Voznak in Quantum Key Distribution Networks
    Chapter 2022
  15. Intellectual property protection mechanisms and the characteristics of founding teams

    Intellectual property protection mechanisms (IPPMs) are critical to fostering science, technology, and innovation, and their relevance has grown...

    Sara Amoroso, Albert N. Link in Scientometrics
    Article 18 July 2021
  16. From Point-to-Point to End-to-End Security in Quantum Key Distribution Networks

    Because quantum key distribution is a technology for establishing keys for symmetric encryption (preferably one-time pads, but more practically keys...
    Miralem Mehic, Stefan Rass, ... Miroslav Voznak in Quantum Key Distribution Networks
    Chapter 2022
  17. Beyond the Csiszár–Körner Bound: Best-Possible Wiretap Coding via Obfuscation

    A wiretap coding scheme (Wyner in Bell Syst Tech J 54(8):1355–1387, 1975) enables Alice to reliably communicate a message m to an honest Bob by...

    Yuval Ishai, Alexis Korb, ... Amit Sahai in Journal of Cryptology
    Article Open access 18 October 2023
  18. Intelligent Reflecting Surface-Aided Physical-Layer Security Communications

    The broadcast nature of wireless communication systems makes wireless transmission extremely susceptible to eavesdrop** and even malicious...
    Chapter 2023
  19. Security in IoT-enabled smart agriculture: architecture, security solutions and challenges

    Agricultural industry is one of the most vital industries that has a major contribution to the economy due to its share in the Gross Domestic Product...

    Anusha Vangala, Ashok Kumar Das, ... Joel J. P. C. Rodrigues in Cluster Computing
    Article 18 April 2022
  20. Mosaics of combinatorial designs for information-theoretic security

    We study security functions which can serve to establish semantic security for the two central problems of information-theoretic security: the...

    Moritz Wiese, Holger Boche in Designs, Codes and Cryptography
    Article Open access 05 January 2022
Did you find what you were looking for? Share feedback.