We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,227 results
  1. Secure Text Transfer Using Diffie–Hellman Key Exchange Algorithm in Cloud Environment

    Secure text transfer is a process of securely transferring text-based data over a shared network, ensuring that the data remains confidential and...
    Vijay Prakash, Tanishka Goyanka, ... Varun Shukla in Cryptology and Network Security with Machine Learning
    Conference paper 2024
  2. Hybrid: (NH–DH) a New Hope and Diffie–Hellman for Transmission Data in Cloud Environment

    Since the creation of cloud computing and its widespread usage, data security was a significant problem. Different frameworks were suggested;...
    Conference paper 2023
  3. A Lattice-Based Key Exchange Protocol Over NTRU-NIP

    We introduce NTRU-NIP-KE, a novel non-invertible polynomial (NTRU-NIP)-based key exchange protocol that is immune to quantum attacks. NTRU-NIP offers...
    Conference paper 2024
  4. A Hybrid Post-Quantum Cryptography Driven Key Exchange Scheme for Cloud Computing Environments

    In connection with Post-Quantum Cryptography (PQC), it is indispensable to upgrade cloud data security schemes and also key exchange schemes. The...
    Shaik Mohammad Ilias, V. Ceronmani Sharmila in Intelligent Sustainable Systems
    Conference paper 2023
  5. A Three-Factor Authenticated Mobile Key Exchange Protocol Using Matrices Over Group Ring Structure

    Firstly, we know that the RSA/Discrete Logarithm assumptions don’t support devices with low computing. The factorization with discrete logarithm...
    Dharminder Chaudhary, G. Senthamizh, K. P. Sreekutty in Emerging Technologies in Electrical Engineering for Reliable Green Intelligence
    Conference paper 2024
  6. An innovative key agreement protocol with complex attribute authentication based on blockchain

    In cloud environment, attribute-based key agreement (AB-KA) protocol can be applied in the practical scenario of achieving session key by mutual...

    Shengzhou Hu, Wenhao Li, ... Hua He in Peer-to-Peer Networking and Applications
    Article 22 May 2023
  7. Key Exchange Protocol Based on the Matrix Power Function Defined Over

    In this paper we propose a key exchange protocol (KEP) based on the so-called matrix power function (MPF) defined over a non-commuting platform...
    Aleksejus Mihalkovich, Eligijus Sakalauskas, Matas Levinskas in Intelligent Computing
    Conference paper 2022
  8. Key Agreement Using Symmetric Group

    The utilization of key agreement protocols within the domain of cryptography is indispensable for ensuring secure and confidential communication...
    Prakersh Bajpai, Manoj Kumar Misra, ... Shailendra Singh in Cryptology and Network Security with Machine Learning
    Conference paper 2024
  9. Ephemeral Elliptic Curve Diffie-Hellman to Secure Data Exchange in Internet of Medical Things

    The COVID-19 epidemic has accelerated the deployment of remote healthcare monitoring with the overload of hospitals with patients requiring immediate...
    Osman Salem, Ahmed Mehaoua in Emerging Trends in Cybersecurity Applications
    Chapter 2023
  10. Study of Key Agreement Protocol Implementation in Constraint Environment

    The key establishment (agreement) protocol constructed using public key cryptography (like RSA, D–H key exchange, Elliptic Curve Cryptography) can...
    Chandrashekhar Goswami, Amit K. Gaikwad, ... Shraddha Utane in ICT: Smart Systems and Technologies
    Conference paper 2024
  11. Prevention of the Man-in-the-Middle Attack on Diffie–Hellman Key Exchange Algorithm: A Review

    In this report, we demonstrate the pros and cons of Diffie–Hellman key exchange algorithm that is commonly used for the exchange of keys in...
    Conference paper 2021
  12. Security Issues and Solutions in Post Quantum Authenticated Key Exchange for Mobile Devices

    An authenticated mobile key exchange is necessary for post quantum secure communication over a public channel. It enables two parties to establish a...
    Dharminder Chaudhary, Pradeep Kumar Dadsena, ... Lakshmi M. Preetham in Data Science and Applications
    Conference paper 2024
  13. Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing

    The Vehicular Cloud Computing (VCC) provides significant benefits (e.g., higher resource availability, and low communication latency) to vehicular...

    Saurabh Rana, Dheerendra Mishra, ... Mauro Conti in Wireless Personal Communications
    Article 27 May 2023
  14. A Hybrid Cryptographic Mechanism for Secure Data Transmission in Edge AI Networks

    As Edge AI systems become more prevalent, ensuring data privacy and security in these decentralized networks is essential. In this work, a novel...

    Abdulmohsen Almalawi, Shabbir Hassan, ... Asif Irshad Khan in International Journal of Computational Intelligence Systems
    Article Open access 06 February 2024
  15. OpenPGP Email Forwarding via Diverted Elliptic Curve Diffie-Hellman Key Exchanges

    An offline OpenPGP user might want to forward part or all of their email messages to third parties. Given that messages are encrypted, this requires...
    Conference paper 2022
  16. Hyperchaotic-Based Neural Synchronized Complex Key Exchange in Wireless Sensor Network

    This paper presents a hyperchaotic-based neural synchronized complex key exchange for secure transmission in wireless sensor network (WSN). WSNs are...

    Article 09 January 2023
  17. Comparative research on block design-based protocol and blowfish for secured key generation and data sharing on cloud

    Confidentiality of maintaining the Electronic Health Records of patients is a major concern to both the patient and Doctor. Sharing the data on cloud...

    Uma Hombal, Dayananda Rangapura Basavaraju, Ashwini S. Shinde in Soft Computing
    Article 05 July 2024
  18. Non-invertible key exchange protocol

    We investigate a cryptosystem through what we call non-invertible cryptography. As a result of a continuous refinement process, we present a new key...

    Luis Adrian Lizama-Perez in SN Applied Sciences
    Article Open access 15 May 2020
  19. SOA Based BB84 Protocol for Enhancing Quantum Key Distribution in Cloud Environment

    Quantum Key Distribution (QKD) systems are thought to be the best method for securing data in cloud storage and boosting security and privacy. Due to...

    Shravan Kumar Sehgal, Rashmi Gupta in Wireless Personal Communications
    Article 24 March 2023
  20. RETRACTED ARTICLE: A secured multiplicative Diffie Hellman key exchange routing approach for mobile ad hoc network

    As related to environments which possess non-malicious nodes contained in a network, the well-known protocols that are provides by the existing...

    Article 18 December 2019
Did you find what you were looking for? Share feedback.