نتایج جستجو برای: lightweight cryptography
تعداد نتایج: 58663 فیلتر نتایج به سال:
To achieve efficient vehicular network communication and service, researchers proposed fog-based networks (FVNs). One of the prerequisites for developing large-scale FVNs is ensuring security privacy entire environment. However, existing schemes exist considerable calculation costs and/or vulnerabilities. Therefore, to promote FVN authentication, we propose a lightweight protocol using self-cer...
Traditional and lightweight cryptography primitives protocols are insecure against quantum attacks. Thus, a real-time application using traditional or does not ensure full-proof security. Post-quantum is important for the internet of things (IoT) due to its security This paper offers broad literature analysis post-quantum IoT networks, including challenges research directions adopt in applicati...
Wireless Sensor Networks (WSNs) are networks of small devices with limited resources which able to collect different information for a variety purposes. Energy and security play key role in these MAC aspects fundamental their management. The classical approaches not suitable WSNs given the nodes, subsequently require lightweight cryptography mechanisms order achieve high levels. In this paper, ...
Vehicle in vehicular ad hoc networks (VANETs) broadcasts beacons about their traffic status wirelessly for improving safety and efficiency. Before deployment of the VANET system, problems related to security privacy should be carefully addressed. In this article, we propose a lightweight authentication with conditional privacy-preserving scheme guaranteeing secure communication VANET. The propo...
Internet of Things devices, platform programs, and network applications are all vulnerable to cyberattacks (digital attacks), which can be prevented at different levels by using cybersecurity protocol. In the (IoT), specifically intended retrieve or change/destroy sensitive information that may exceed IoT’s advantages. Furthermore, design a lightweight mechanism experiences critical challenge w...
Some lattice-based public key cryptosystems allow one to transform ciphertext from one lattice or ring representation to another e ciently and without knowledge of public and private keys. In this work we explore this lattice transformation property from cryptographic engineering viewpoint. We apply ciphertext transformation to compress Ring-LWE ciphertexts and to enable e cient decryption on a...
This paper mirrors an invited talk to ISCISC 2011. It is not a conventional paper so much as an essay summarizing thoughts on a little-talked-about subject. My goal is to intermix some introspection about definitions with examples of them, these examples drawn mostly from cryptography. Underpinning our discussion are two themes. The first is that definitions are constructed. They are i...
Nowadays, the better performance of lightweight structures during earthquake has resulted in using lightweight concrete more than ever. However, determining the compressive strength of concrete used in these structures during their service through a none-destructive test is a popular and useful method. One of the main methods of non-destructive testing in the assessment of compressive strength...
Symmetric cipher cryptography is an efficient technique for encrypting bits and letters to maintain secure communication data confidentiality. Compared asymmetric cryptography, symmetric has the speed advantage required various real-time applications. Yet, with distribution of micro-devices wider utilization Internet Things (IoT) Wireless Sensor Network (WSN), lightweight algorithms are operate...
Lightweight steel framing is a method in housing and construction that have been widely used in lightweight steel construction. In this method, the structure is built by cold formed steel elements. They are cost-effective, light, and easy to assemble. However, the performance of lateral load resisting systems in cold-formed steel structures specially the behavior of cold-formed steel shear wall...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید