نتایج جستجو برای: lightweight cryptography

تعداد نتایج: 58663  

Journal: :IJDSN 2005
Arjan Durresi Vamsi Paruchuri Rajgopal Kannan S. Sitharama Iyengar

In this paper, we present a novel lightweight protocol for data integrity in wireless sensor networks. Our protocol is based on leapfrog strategy in which each cluster head verifies if its previous node has preserved the integrity of the packet using the secret key it shares with two hop up tree node. The proposed protocol is simple. The analysis and simulation results show that the protocol ne...

Journal: :Remote Sensing 2022

The acquisition of massive remote sensing data makes it possible to deeply fuse and artificial intelligence (AI). mobility cost advantages new platforms in the Internet Things (IoT) make them ideal for continuous deployment rather than traditional airborne platforms. However, devices are vulnerable malicious attacks privacy leaks when sharing due complex architecture heterogeneity IoT lack a un...

2006
Elisabeth Oswald Martin Feldhofer Christian Rechberger

Project co-funded by the European Commission within the 6th Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission services) RE Restricted to a group specified by the consortium (including the Commission services) CO Confidential, only for members of the consortium (including the Commission services) The information in this do...

Journal: :IACR transaction on symmetric cryptology 2022

Ever since lightweight cryptography emerged as one of the trending topics in symmetric key cryptography, optimizing implementation cost MDS matrices has been center attention. In this direction, various metrics like d-XOR, s-XOR and g-XOR have proposed to mimic hardware cost. Consequently, efforts also made search for optimal dimensions relevant cryptographic applications according these metric...

Journal: :مهندسی عمران فردوسی 0
محمود نادری علیرضا بنیادی

regarding the increasing demand for lightweight concrete especially lightweight structural concrete, and safety requirements underlined in 2800 iranian standard, research to achieve the optimized results in lightweight concrete production seems inevitable. since, one of the commonly used methods for producing the light eight concrete, utilizes the light weight aggregates with significant role i...

2005
Stefan Lindskog Karl-Johan Grinnemo Anna Brunstrom

Data protection is an increasingly important issue in today’s communication networks. Traditional solutions for protecting data when transferred over a network are almost exclusively based on cryptography. As a complement, we propose the use of multiple physically separate paths to accomplish data protection. A general concept for providing physical separation of data streams together with a th...

2011
Donghai Tian Xi Xiong Changzhen Hu Peng Liu

Security Applications Privacy Enhanced Access Control by Means of Policy Blinding p. 108 PolicyBased Authentication for Mobile Agents p. 123 Lightweight Delegated Subset Test with Privacy Protection p. 138 Post-quantum Cryptography and Side-Channel Attack Improving BDD Cryptosystems in General Lattices p. 152 Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme p. 168 A Novel Group Signature S...

Journal: :Computer Networks 2007
Jianping Pan Lin Cai Xuemin Shen Jon W. Mark

Voluntary peer collaboration is often assumed in media access, route discovery, packet forwarding, and upper-layer protocols designed for wireless ad hoc networks. This assumption has been seriously challenged when peers are autonomous, selfish, ormalicious in large-scale, heterogeneous networks. In this paper, based on the latest advances in identity-based cryptography, we design a lightweight...

2016
Eduard Marin Dave Singelée Bart Preneel

In 2013, Rostami et al. proposed a pairing protocol to authenticate device programmers to Implantable Medical Devices (IMDs) based on (lightweight) public-key cryptography and a commitment scheme. Their solution is built upon “touch-to-access”, a novel access-control policy where a device programmer can access an IMD only if it can touch the patient’s skin to measure his heart rate. In this pap...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید