We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 268 results
  1. A Hybrid Post-Quantum Cryptography Driven Key Exchange Scheme for Cloud Computing Environments

    In connection with Post-Quantum Cryptography (PQC), it is indispensable to upgrade cloud data security schemes and also key exchange schemes. The...
    Shaik Mohammad Ilias, V. Ceronmani Sharmila in Intelligent Sustainable Systems
    Conference paper 2023
  2. RETRACTED ARTICLE: A secured multiplicative Diffie Hellman key exchange routing approach for mobile ad hoc network

    As related to environments which possess non-malicious nodes contained in a network, the well-known protocols that are provides by the existing...

    Article 18 December 2019
  3. OpenPGP Email Forwarding via Diverted Elliptic Curve Diffie-Hellman Key Exchanges

    An offline OpenPGP user might want to forward part or all of their email messages to third parties. Given that messages are encrypted, this requires...
    Conference paper 2022
  4. Key Exchange Protocol Based on the Matrix Power Function Defined Over

    In this paper we propose a key exchange protocol (KEP) based on the so-called matrix power function (MPF) defined over a non-commuting platform...
    Aleksejus Mihalkovich, Eligijus Sakalauskas, Matas Levinskas in Intelligent Computing
    Conference paper 2022
  5. An innovative key agreement protocol with complex attribute authentication based on blockchain

    In cloud environment, attribute-based key agreement (AB-KA) protocol can be applied in the practical scenario of achieving session key by mutual...

    Shengzhou Hu, Wenhao Li, ... Hua He in Peer-to-Peer Networking and Applications
    Article 22 May 2023
  6. Study of Key Agreement Protocol Implementation in Constraint Environment

    The key establishment (agreement) protocol constructed using public key cryptography (like RSA, D–H key exchange, Elliptic Curve Cryptography) can...
    Chandrashekhar Goswami, Amit K. Gaikwad, ... Shraddha Utane in ICT: Smart Systems and Technologies
    Conference paper 2024
  7. Non-invertible key exchange protocol

    We investigate a cryptosystem through what we call non-invertible cryptography. As a result of a continuous refinement process, we present a new key...

    Luis Adrian Lizama-Perez in SN Applied Sciences
    Article Open access 15 May 2020
  8. Symmetric key and polynomial-based key generation mechanism for secured data communications in 5G networks

    Fifth Generation (5G) networks provide data communications through various latest technologies including Software Defined Networks (SDN), Artificial...

    S. Pradeep, S. Muthurajkumar, ... A. Kannan in Soft Computing
    Article 31 January 2024
  9. GDH Key Exchange Protocol for Group Security Among Hypercube Deployed IoT Devices

    Effective deployment of IoT devices to preserve security, with minimum computations and energy consumption will be great challenge in the current...
    Vimal Gaur, Rajneesh Kumar in Mobile Radio Communications and 5G Networks
    Conference paper 2021
  10. An Effective Data Security Mechanism for Secured Data Communications Using Hybrid Cryptographic Technique and Quantum Key Distribution

    One of the most flamboyant technological novelties of today's world is cloud computing, which has been fuelled by the increase in the number of smart...

    Jananya Sivakumar, Sannasi Ganapathy in Wireless Personal Communications
    Article 01 December 2023
  11. A Novel Post-quantum Piekert’s Reconciliation-Based Forward Secure Authentication Key Agreement for Mobile Devices

    Lattice-based cryptography plays a very important role in authentication and key exchanges that protects against the threat of quantum attacks....
    Chaudhary Dharminder, S. S. Anushaa, ... M. S. P. Durgarao in Communication and Intelligent Systems
    Conference paper 2023
  12. Concurring of Neural Machines for Robust Session Key Generation and Validation in Telecare Health System During COVID-19 Pandemic

    In this technique, it has been proposed to agree the session keys that have been generated through dual artificial neural networks based on the...

    Joydeep Dey, Anirban Bhowmik in Wireless Personal Communications
    Article 02 April 2023
  13. A Paring-Free ID-Based Authenticated Key Agreement Protocol for IoT Environment

    The Internet of Things (IoT) has become a growing technology now a days. IoT security aspect needs an authenticated session key in view of the...
    Conference paper 2023
  14. A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids

    There exists a problem of user privacy leakage in the smart grids (SGs) that malicious attackers may intercept or tamper with electricity data and...

    Huiwen Wang, Liangliang Wang, ... Yiyuan Luo in Wireless Personal Communications
    Article 23 June 2022
  15. Towards Multi-user Searchable Encryption Scheme with Support for SQL Queries

    Due to the tremendous benefits of cloud computing, organizations are highly motivated to store electronic records on clouds. However, outsourcing...

    Mingyue Li, Ruizhong Du, Chunfu Jia in Mobile Networks and Applications
    Article 08 December 2021
  16. Validate Merchant Server for Secure Payment Using Key Distribution

    Nowadays, growing and competitiveness of a financial sector and e-healthcare application developed rapidly and quicker ever so that mobile payment...
    A. Saranya, R. Naresh in Cyber Security, Privacy and Networking
    Conference paper 2022
  17. Analysis and improvement of a key exchange and authentication protocol in client-server environment

    With the rapid development of mobile communication technologies and network applications, communication models for mobile client and server...

    Yuting Li, Qingfeng Cheng, **nghua Li in Journal of Ambient Intelligence and Humanized Computing
    Article 28 November 2019
  18. Two-Server 3D ElGamal Diffie-Hellman Password Authenticated and Key Exchange Protocol Using Geometrical Properties

    In the contemporary world, Internet based services undoubtedly plays a vital role in supporting business processes. Yet, these services suffer from...

    K. Anitha Kumari, G. Sudha Sadasivam in Mobile Networks and Applications
    Article 20 August 2018
  19. A public key cryptosystem and signature scheme based on numerical series

    A public key cryptosystem and signature scheme based on a proposed key exchange algorithm are introduced. The key exchange algorithm is based on the...

    Khaled A. Nagaty in SN Applied Sciences
    Article 01 January 2020
Did you find what you were looking for? Share feedback.