We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 8,623 results
  1. PGASH: Provable group-based authentication scheme for Internet of Healthcare Things

    Electronic healthcare based on medical sensors is now develo** to incorporate a significant amount of the Internet of Things (IoT) to communicate...

    Chandan Trivedi, Keyur Parmar, Udai Pratap Rao in Peer-to-Peer Networking and Applications
    Article 12 January 2024
  2. Provable and Practical Security 17th International Conference, ProvSec 2023, Wuhan, China, October 20–22, 2023, Proceedings

    This volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and Practical Security, ProvSec 2023,...

    Mingwu Zhang, Man Ho Au, Yudi Zhang in Lecture Notes in Computer Science
    Conference proceedings 2023
  3. Provable and Practical Security 16th International Conference, ProvSec 2022, Nan**g, China, November 11–12, 2022, Proceedings

    This book constitutes the refereed proceedings of the 16th International Conference on Provable Security, ProvSec 2022, held in Nan**g, China, in...
    Chunpeng Ge, Fuchun Guo in Lecture Notes in Computer Science
    Conference proceedings 2022
  4. Provable secure authentication key agreement for wireless body area networks

    Wireless body area networks (WBANs) guarantee timely data processing and secure information preservation within the range of the wireless access...

    Yuqian Ma, Wenbo Shi, ... Qingfeng Cheng in Frontiers of Computer Science
    Article 23 December 2023
  5. Farasha: A Provable Permutation-Based Parallelizable PRF

    The pseudorandom function Farfalle, proposed by Bertoni et al. at ToSC 2017, is a permutation based arbitrary length input and output PRF. At its...
    Najwa Aaraj, Emanuele Bellini, ... Eugenio Salazar in Selected Areas in Cryptography
    Conference paper 2024
  6. A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid

    With the gradual maturity of Smart Grid (SG), security challenges become the most important issues that need to be addressed urgently. In recent...

    Cong Wang, Peng Huo, ... Yiying Zhang in Computing
    Article Open access 27 June 2023
  7. A collusion-resistant certificateless provable data possession scheme for shared data with user revocation

    Cloud storage service can provide a lot convenience for users to collect, store and share data within a group. However, there are some secure issues,...

    Guang Yang, Lidong Han, ... Fuqun Wang in Cluster Computing
    Article 23 June 2023
  8. Efficient data transfer supporting provable data deletion for secure cloud storage

    With the widespread popularity of cloud storage, a growing quantity of tenants prefer to upload their massive data to remote cloud data center for...

    Changsong Yang, Yueling Liu, Yong Ding in Soft Computing
    Article 30 April 2022
  9. Provable Security of  \(\textrm{HADES}\) Structure

    The \(\textrm{HADES}\) design strategy combines...
    Yuan Gao, Chun Guo in Cryptology and Network Security
    Conference paper 2022
  10. Limits in the Provable Security of ECDSA Signatures

    Digital Signatures are ubiquitous in modern computing. One of the most widely used digital signature schemes is...
    Dominik Hartmann, Eike Kiltz in Theory of Cryptography
    Conference paper 2023
  11. New Limits of Provable Security and Applications to ElGamal Encryption

    We provide new results showing that ElGamal encryption cannot be proven CCA1-secure – a long-standing open problem in cryptography. Our result...
    Conference paper 2024
  12. Provable Data Possession (PDP) and Proofs of Retrievability (POR) of Current Big User Data

    A growing trend over the last few years is storage outsourcing, where the concept of third-party data warehousing has become more popular. This trend...

    Ieuan Walker, Chaminda Hewage, Ambikesh Jayal in SN Computer Science
    Article Open access 24 November 2021
  13. Provable and Practical Security 15th International Conference, ProvSec 2021, Guangzhou, China, November 5–8, 2021, Proceedings

    This book constitutes the refereed proceedings of the 15th International Conference on Provable Security, ProvSec 2021, held in Guangzhou, China, in...

    Qiong Huang, Yu Yu in Lecture Notes in Computer Science
    Conference proceedings 2021
  14. Provable Security Analysis of FIDO2

    We carry out the first provable security analysis of the new FIDO2 protocols, the promising FIDO Alliance’s proposal for a standard for passwordless...
    Manuel Barbosa, Alexandra Boldyreva, ... Bogdan Warinschi in Advances in Cryptology – CRYPTO 2021
    Conference paper 2021
  15. Improved Provable Reduction of NTRU and Hypercubic Lattices

    Lattice-based cryptography typically uses lattices with special properties to improve efficiency. We show how blockwise reduction can exploit...
    Henry Bambury, Phong Q. Nguyen in Post-Quantum Cryptography
    Conference paper 2024
  16. Quantum cryptography based cloud security model (QC-CSM) for ensuring cloud data security in storage and accessing

    In recent days, cloud computing is a universal computing and conventional paradigm, in which the resources are provided over the Internet based on...

    K. Sundar, S. Sasikumar, ... S. karthick in Multimedia Tools and Applications
    Article 24 April 2023
  17. Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle

    We study the provable security claims of two NIST Lightweight Cryptography (LwC) finalists, GIFT-COFB and Photon-Beetle, and present several attacks...
    Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu in Applied Cryptography and Network Security
    Conference paper 2022
  18. Provable user authentication scheme on ECC in multi-server environment

    Authentic communication is an inevitable trend in the fourth industrial revolution. In a city, the convenient administrative formalities should be...

    Toan-Thinh Truong, Minh-Triet Tran, ... Trong-Nguyen Nguyen in The Journal of Supercomputing
    Article 18 July 2022
  19. Cryptanalysis of Short and Provable Secure Lattice-Based Signature Scheme

    Fenghe and Zhenhua proposed a short and provable secure lattice-based signature scheme in the standard model in 2016. Their aim was to construct a...
    Ramakant Kumar, Sahadeo Padhye, Swati Rawal in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2024
  20. What, Indeed, is an Achievable Provable Guarantee for Learning-Enabled Safety-Critical Systems

    Machine learning has made remarkable advancements, but confidently utilising learning-enabled components in safety-critical domains still poses...
    Saddek Bensalem, Chih-Hong Cheng, ... **ngyu Zhao in Bridging the Gap Between AI and Reality
    Conference paper 2024
Did you find what you were looking for? Share feedback.