We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Symmetric key and polynomial-based key generation mechanism for secured data communications in 5G networks

    Fifth Generation (5G) networks provide data communications through various latest technologies including Software Defined Networks (SDN), Artificial...

    S. Pradeep, S. Muthurajkumar, ... A. Kannan in Soft Computing
    Article 31 January 2024
  2. A Highly Consistent and High-speed Physical Layer Key Generation Scheme

    There are some problems that the bit error rate is high but generation rate is low in existing physical layer secret key generation schemes, so we...

    Jiayu Zhao, **gmei Liu, Ruibin Dai in Wireless Personal Communications
    Article 01 November 2023
  3. A High Consistency Wireless Key Generation Scheme for Vehicular Communication Based on Wiener Filter Extrapolation

    Secret key generation from wireless channel is an emerging technology for communication network security, which exploits the reciprocity and time...

    Yiming Ma, Linning Peng, ... Hongxing Hu in Automotive Innovation
    Article 03 November 2023
  4. Power Allocation under Given Secret Key Generation Rate for Secure Wireless OFDM Systems

    Abstract

    Generating a secret key from the physical layer is one of the most challenging topics in cryptography. Secret key generation rate (SKGR) and...

    A. Aliabadian, M. R. Zahabi, M. Mobini in Journal of Communications Technology and Electronics
    Article 01 May 2023
  5. Efficient Key Generation Techniques for Wireless Body Area Network

    In wireless body area network health care applications, energy-constraint wearable devices are used to monitor patient physiological parameters. The...

    S. Divya, K. V. Prema, Balachandra Muniyal in International Journal of Wireless Information Networks
    Article Open access 06 June 2023
  6. A powerful adversary model and corresponding OTP time slot allocation scheme in RIS-assisted physical layer key generation

    Physical layer key generation (PLKG) is a technique of information-theoretic security to tackle the problem of key distribution between...

    Liquan Chen, Yufan Song, ... Liang Chen in EURASIP Journal on Wireless Communications and Networking
    Article Open access 11 July 2024
  7. Simple, secure and lightweight authentication protocol with session-key generation for IIoT device in IIoT networks

    Device authentication is essential for protecting IIoT networks due to the industrial internet of things (IIoT) rise in connected devices. This work...

    Usha Jain, Aprna Tripathi, ... Gireesh Kumar in Microsystem Technologies
    Article 05 December 2023
  8. Comparative research on block design-based protocol and blowfish for secured key generation and data sharing on cloud

    Confidentiality of maintaining the Electronic Health Records of patients is a major concern to both the patient and Doctor. Sharing the data on cloud...

    Uma Hombal, Dayananda Rangapura Basavaraju, Ashwini S. Shinde in Soft Computing
    Article 05 July 2024
  9. Generation of high-order random key matrix for Hill Cipher encryption using the modular multiplicative inverse of triangular matrices

    Hill Cipher is one of the classic symmetric encryption algorithms widely used in cloud data security. Although the hill cipher principle is...

    Yuehong Chen, Rong **e, ... Weiwei Lin in Wireless Networks
    Article 16 April 2023
  10. Fingerprint-Based Asymmetric Bio-Cryptographic Key Generation Using Convolution Network

    The asymmetric cryptography techniques use in the field of data security suffer from the challenge of maintaining the private key as secret. As a...
    Diptadip Maiti, Madhuchhanda Basak, Debashis Das in Fourth Congress on Intelligent Systems
    Conference paper 2024
  11. An Improvised Algorithm for a Dynamic Key Generation Model

    Data may be kept private, secure, and authentic via cryptography. Computational resources and communication channel performance impede the...
    D. V. Guru Saran, Kurunandan Jain in Inventive Computation and Information Technologies
    Conference paper 2023
  12. Evaluation of cryptographic key generation performance using evolutionary algorithm

    The process of key generation is at the heart of each cryptography method’s encryption and decryption. As a result, it is necessary to make the key...

    Article 24 January 2022
  13. Unveiling the energy consumption-food waste nexus in households: A focus on key predictors of food waste generation

    In most cities worldwide, household food waste constitutes a significant portion of municipal solid waste (MSW). However, its management often proves...

    Luis Izquierdo-Horna, Ramzy Kahhat, Ian Vázquez-Rowe in Journal of Material Cycles and Waste Management
    Article 02 May 2024
  14. Two-factor-based RSA key generation from fingerprint biometrics and password for secure communication

    In an asymmetric-key cryptosystem, the secure storage of private keys is a challenging task. This paper proposes a novel approach for generating the...

    K. Suresh, Rajarshi Pal, S. R. Balasundaram in Complex & Intelligent Systems
    Article Open access 18 February 2022
  15. An Enhancement in Crypto Key Generation Using Image Features with CRT

    Strong cryptographic algorithms are the main sources for building security systems. However, providing security depends on the secret information...
    Kalyanapu Srinivas, Noothi Sravan Kumar, ... K. Rama Devi in Proceedings of the 2nd International Conference on Cognitive and Intelligent Computing
    Conference paper 2023
  16. Area and Power Efficient AVLS-TSPC-Based Diffused Bit Generator for Key Generation

    The diffused bit generator (DBG) is an entropy generator that generates a stream of random bits. DBG is realized using a linear feedback shift...

    B. S. Premananda, Abdur Rehman, P. Megha in Circuits, Systems, and Signal Processing
    Article 31 January 2024
  17. Concurring of Neural Machines for Robust Session Key Generation and Validation in Telecare Health System During COVID-19 Pandemic

    In this technique, it has been proposed to agree the session keys that have been generated through dual artificial neural networks based on the...

    Joydeep Dey, Anirban Bhowmik in Wireless Personal Communications
    Article 02 April 2023
  18. Research on Key Technologies of New Generation Vehicle Wireless Network

    With the continuous improvement of automobile intelligence, the delay, synchronization, reliability, security and concurrency of on-board network are...
    Xuan Dong, Bo Li, Zhiyu Zheng in Advances in Wireless Communications and Applications
    Conference paper 2023
  19. Securing Communication in IoT Environment Using Lightweight Key Generation-Assisted Homomorphic Authenticated Encryption

    Cryptographic key establishment is an essential component between any pairwise resource-constrained sensor nodes inside an Internet of Things (IoT)...
    Ajeet Singh, Vikas Tiwari, ... Ashutosh Saxena in Computer Communication, Networking and IoT
    Conference paper 2023
  20. Optimizing the Key-Pair Generation Phase of McEliece Cryptosystem

    Quantum computers are no longer ideas but concrete devices. They could represent a threat for public key cryptography; therefore, in 2017 NIST...
    Conference paper 2022
Did you find what you were looking for? Share feedback.