نتایج جستجو برای: lightweight cryptography
تعداد نتایج: 58663 فیلتر نتایج به سال:
Internet of things is shortened as IoT. Today IoT a key and abrogating subject the specialized social importance. Results buyers, vehicles, industry based fundamental segments, sensors, other everyday items are converged with network internet solid information abilities which guarantee to change sort in we work live. The proposed demonstrates implementation symmetric lightweight algorithm for s...
Visual cryptography is a method that makes use of the characteristics of human vision and it requires neither the knowledge of cryptography nor the complex calculations. This method was first proposed by Naor and Shamir, its implementation is simple, it has been extended to an secrect sharing (k, n) in which n shares are made from the image and they are distributed among n participants. Moreov...
Elliptic Curve Cryptography is gaining attraction in providing a high security level data transmission with low cost, small key size and smaller hardware realization. High-speed implementation significant factor ECC applications such as smart cards, network servers, wireless sensor based networks, Internet of Things Radio Frequency Identification. These require low-cost lightweight implementati...
Optimization of resource consumption and decreasing the response time authentication requests is an immense urgent requirement for supporting scalability resources in IoT environments. The existing research attempts to design lightweight protocols address these issues. However, schemes proposed literature are lacking creation a (i.e., low computing, communication, storage cost) secure architect...
In this paper, we analyze the resistance of the lightweight ciphers PRESENT, LED, and KLEIN to biclique attacks. Primarily, we describe attacks on the full-round versions PRESENT-80, PRESENT-128, LED-64, LED-128, KLEIN-80, and KLEIN-96. Our attacks have time complexities of 2, 2, 2, 2, 2, and 2 encryptions, respectively. In addition, we consider attacks on round-reduced versions of PRESENT and ...
This paper presents Group Membership Service for JXTA extended with single or bi-directional authentication. The proposed solution exploits certificates and PKI (Public Key Infrastructure). All information about the system's users is kept in the LDAP. An attention has been also paid to the problem of a private key secure protection.
We present a framework for extending the functionality of LDAP servers from their typical use as a public directory in public key infrastructures. In this framework the LDAP servers are used for administrating infrastructure processes. One application of this framework is a method for providing proof-of-possession, especially in the case of encryption keys. Another one is the secure delivery of...
In this paper we provide a guide for public key infrastructure designers and administrators when planning for directory services. We concentrate on the LDAP directories and how they can be used to successfully publish PKI information. We analyse their available mechanisms and propose a best practice guide for use in PKI. We then take a look into the German Signature Act and Ordinance and discus...
The current draft standard of 802.11s has defined routing for Wireless Mesh Networks (WMNs) in layer-2 and to differentiate from layer-3 routing, it termed layer-2 routing as path selection. The layer-2 path selection (LPS) mechanism is fully specified in the draft of IEEE 802.11s for WMNs. However, routing with security provision is not specified in the standard. Our study identifies that the ...
In this study, first by surveythe parameters affecting the compressive strength, such as water to cement ratio, cementgrade, silica fume to cement percentage, and the various ratios oflight weight aggregate LECA, to total aggregate, Taguchi method is used, to test 9 mix designsobtained the mix design optimization. Since lightweight concrete is brittle like normal concrete, to resolve this probl...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید