نتایج جستجو برای: passive key generation center attack

تعداد نتایج: 1271168  

Journal: :Optics express 2017
Kyongchun Lim Heasin Ko Changho Suh June-Koo Kevin Rhee

Needs for providing security to end users have brought installation of quantum key distribution (QKD) in one-to-many access networks such as passive optical networks. In the networks, a presence of optical power splitters makes issues for secure key rate more important. However, researches for QKD in access networks have mainly focused on implementation issues rather than protocol development f...

رشیدی پور, علی, وفایی, عباسعلی,

  Interaction of Intrahippocampal Injection of Naltheroxone and Corticosterone on Consolidation and Retreival Memory Processes in Passive   Avoidance Task in Rat     AA. Vafaei [1] , A. Rashidy-Pour [2]     Received: 15/01/08 Sent for Revision: 01/07/08 Received Revised Manuscript: 15/09/08 Accepted: 20/10/08     Background and Objectives Previous studies suggested that the role of corticostero...

Journal: :Molecules 2008
Luis R Domingo Salvador Gil Margarita Parra José Segura

Addition of carboxylic acid dianions appears to be a potential alternative to the use of aluminium enolates for nucleophilic ring opening of epoxides. These conditions require the use of a sub-stoichiometric amount of amine (10% mol) for dianion generation and the previous activation of the epoxide with LiCl. Yields are good, with high regioselectivity, but the use of styrene oxide led, unexpec...

Journal: :International journal of engineering & technology 2021

Certificateless Public Key Cryptography (CL-PKC) scheme is a new standard that combines Identity (ID)-based cryptography and tradi- tional PKC. It yields better security than the ID-based without requiring digital certificates. In CL-PKC scheme, as Generation Center (KGC) generates public key using partial secret key, need for authenticating by trusted third party avoided. Due to lack of authen...

Journal: :Sustainability 2022

The reconfigurable intelligent surfaces (RIS) is a new technology that can be utilized to provide security vehicle-to-vehicle (V2V) communications at the physical layer. In this paper, we achieve higher key generation rate for V2V lower cost and computational complexity. We investigate use of passive RIS as relay, introduce channel diversity increase (KGR), accordingly. regard, consider subsets...

2011
Sandro Coretti

4 Voting with Homomorphic Encryption 3 4.1 Zero-Knowledge Proofs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 4.2 Homomorphic Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 4.2.1 Homomorphic Encryption and Decryption . . . . . . . . . . . . . . . . . . . 4 4.2.2 Distributed Key Generation . . . . . . . . . . . . . . . . . . . . . . . . . . ...

2010
Minghua Qu Doug Stinson Scott Vanstone

In 1997, H. Sakazaki, E. Okamato and M. Mambo [4] proposed an ID-based key distribution system on an elliptic curve over Zn. We will cryptanalyze the scheme and demonstrate that when the hashed ID length is about 160 bits, the scheme is insecure. To be specific, after requesting a small number of keys from the Center, our attack allows a new valid key to be constructed without any further inter...

Journal: :International journal of recent technology and engineering 2022

The group key management technique is an important for cryptographic applications. In this paper, we implemented our proposed method [1] on a protocol communication. authenticated distribution mechanism distributing key. We also discussed security analysis and attacks in active passive adversary model. Also, it ensures semantic as well Key freshness of the Along with this, they provide implicit...

Journal: :Wireless Communications and Mobile Computing 2022

As the product of third information technology revolution, Internet Things (IoT) has greatly altered our way lifetime. Cloud storage gradually become best choice for data processing due to its scalability and flexibility. However, cloud is not a completely trusted entity, such as tampering with user or leaking personal privacy. Therefore, usually adopts attribute-based encryption schemes accomp...

Journal: :IEEE Sensors Journal 2021

Body Area Networks (BAN) are wireless networks designed for deployment on or within the human body. These primarily intended application themedical domain due to their capabilities enablingwireless monitoring of physiological signals, and remote administration medical devices. Due use case, securing these devices is paramount. In recent years, several key generationand agreement schemes that re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید