Showing 61 - 80 results of 221 for search '"cryptographic key"', query time: 0.21s Refine Results
  1. 61

    Securing Telecommunication Based On Speaker Voice As The Public Key. by Enayah, Monther Rateb, Samsudin, Azman

    Published 2007
    “…This paper proposes a technique to generate a public cryptographic key from user’s voice while speaking over a handheld device. …”
    Get full text
    Article
  2. 62

    New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets. by Alia, Mohammad Ahmad, Samsudin, Azman

    Published 2007
    “…In this paper, we propose a new cryptographic key exchange protocol based on Mandelbrot and Julia Fractal sets. …”
    Get full text
    Article
  3. 63

    Secured telemetry based on time-variant sensing matrix – An empirical study of spectroscopic profiling by Yinsheng Zhang, Menglei Liu

    Published 2023-10-01
    “…Time-variant sub-Nyquist sensing matrix is designed as a dynamic cryptographic key to secure the node-to-node signal transmission. …”
    Get full text
    Article
  4. 64

    KERBEROS SECURITY EVALUATION by Hussain Mahdi

    Published 2008-09-01
    “…Smart card can enhance the security by storing the cryptographic key to perform dual factor authentication, it also can manage the encryption and decryption of the Kerberos keys on it rather then on the client workstation memory. …”
    Get full text
    Article
  5. 65

    Security Verification in the Context of 5G Sensor Networks by Piotr Remlein, Urszula Stachowiak

    Published 2021-06-01
    “…The scheme may be implemented, for instance, in the TLS/DTLS protocol to create a secure cryptographic key exchange mechanism. The aim of the publication is to demonstrate that automated symbolic analysis may be relied upon to model 5G sensor networks security protocols. …”
    Get full text
    Article
  6. 66

    A Generic Security Proof for Quantum Key Distribution by Christandl, M, Renner, R, Ekert, A

    Published 2004
    “…Quantum key distribution allows two parties, traditionally known as Alice and Bob, to establish a secure random cryptographic key if, firstly, they have access to a quantum communication channel, and secondly, they can exchange classical public messages which can be monitored but not altered by an eavesdropper, Eve. …”
    Journal article
  7. 67

    Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing by James (Jong Hyuk) Park, Wanlei Zhou

    Published 2016-09-01
    “…It is also often used as a measure of the unpredictability of a cryptographic key in cryptography research areas. Ubiquitous computing (Ubi-comp) has emerged rapidly as an exciting new paradigm. …”
    Get full text
    Article
  8. 68

    Plactic key agreement (insecure?) by Brown Daniel R. L.

    Published 2023-02-01
    “…Plactic key agreement is a new type of cryptographic key agreement that uses Knuth’s multiplication of semistandard tableaux from combinatorial algebra. …”
    Get full text
    Article
  9. 69

    Tackling Denial of Service Attacks on Key Management in Software-Defined Quantum Key Distribution Networks by Miralem Mehic, Stefan Rass, Emir Dervisevic, Miroslav Voznak

    Published 2022-01-01
    “…A QKD network provides an additional security layer for IT-secure cryptographic key distribution that is added to existing conventional networks. …”
    Get full text
    Article
  10. 70

    Proposed Hybrid Approach of Stream Cipher base on Selector of Encryption operation and Key Symmetric translate by Alaa Kadim Farhan

    Published 2011-08-01
    “…A stream cipher is a method of encrypting text (to produce cipher text) in which a cryptographic key and algorithm are applied to each binary digit in a data stream, one bit at a time. …”
    Get full text
    Article
  11. 71

    Software implementation of side-channel analysis on AES encryption with different key length by Heng, Denley Jing Jie

    Published 2022
    “…This leads to side-channel attacks (SCA) which can be used for exploiting the leakage to recover the cryptographic key. In order to increase the resistance against side-channel attacks, one way is to increase the key search complexity of encryption by increasing the key length. …”
    Get full text
    Final Year Project (FYP)
  12. 72

    Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms by Hala Bahjat Abdul Wahab, Suhad Malallah Kadhem, Estabraq Abdul Redaa Kadhim

    Published 2014-01-01
    “…This paper produces a new cryptographic key generation approach that investigate from metaheuristic algorithms (Greedy Randomized Adaptive Search Procedure (GRASP) and Variable Neighborhood Search(VNS)) in order generate symmetric mask key that consist of more the one EC points with minimum correlation among points. …”
    Get full text
    Article
  13. 73

    Low Mismatch Key Agreement Based on Wavelet-Transform Trend and Fuzzy Vault in Body Area Network by Yang Wu, Yongmei Sun, Lei Zhan, Yuefeng Ji

    Published 2013-06-01
    “…By exploiting the high correlation of received signal strength index (RSSI) between peer-to-peer communications, our scheme can provide a shared symmetric cryptographic key under the presence of an eavesdropper. …”
    Get full text
    Article
  14. 74

    Enhancing the SRAM PUF with an XOR Gate by Jack Garrard, Manuel Aguilar Rios, Bertrand Cambou

    Published 2024-11-01
    “…This was implemented using a readily available development board, SRAM devices, and a user-friendly custom circuit board for cryptographic key generation. The cryptographic protocol was implemented using both C++ and python3. …”
    Get full text
    Article
  15. 75

    Blind video watermarking algorithm based on correlations between neighboring frames by GAO Qi, LI Ren-hou, LIU Lian-shan

    Published 2006-01-01
    “…A blind video watermarking method was proposed,in which the watermark composed of symbol part and in-formation part was embedded into the original video frames.After some video frames hiding the watermark were selected randomly from one segment of the video sequences,the symbol water mark was embedded into low frequency discrete cosine transform(DCT) coefficients of fixed blocks of such frames,whereas the information water mark was embedded into direct current coefficients of some other blocks selected by a cryptographic key.Repeat embedding till the whole video was watermarked.To extract the information watermark,the frames holding watermark were found out by detect-ing water the symbol mark rapidly from one video segment whose length was long enough to hold the whole watermark.Then,by using the high correlations between the watermarked frame and its neighboring frames,the pixel values of the blocks where the watermark was embedded can be well estimated.Comparing the estimated values with the current val-ues in the corresponding positions,the information watermark could be reconstructed.Experimental results show that this video watermarking method is robust against attacks such as compression,scaling,frame dropping,etc.…”
    Get full text
    Article
  16. 76

    Guaranteeing Spoof-Resilient Multi-Robot Networks by Gil, Stephanie, Kumar, Swarun, Mazumder, Mark, Katabi, Dina, Rus, Daniela

    Published 2015
    “…This paper proposes a new solution to defend against the Sybil attack, without requiring expensive cryptographic key-distribution. Our core contribution is a novel algorithm implemented on commercial Wi-Fi radios that can "sense" spoofers using the physics of wireless signals. …”
    Get full text
  17. 77

    Improving Error Correction Stage and Expanding the Final Key using Dynamic Linear-feedback Shift Register in Sarg04 Protocol by Omar Sh. Mustafa, Ali H. Yousif, Dana F. Abdulqadir

    Published 2019-04-01
    “…The mechanism of quantum mechanics is considered as the principal method of quantum key distribution for transmitting a cryptographic key between users in unconditionally secure communication. …”
    Get full text
    Article
  18. 78

    Blind video watermarking algorithm based on correlations between neighboring frames by GAO Qi, LI Ren-hou, LIU Lian-shan

    Published 2006-01-01
    “…A blind video watermarking method was proposed,in which the watermark composed of symbol part and in-formation part was embedded into the original video frames.After some video frames hiding the watermark were selected randomly from one segment of the video sequences,the symbol water mark was embedded into low frequency discrete cosine transform(DCT) coefficients of fixed blocks of such frames,whereas the information water mark was embedded into direct current coefficients of some other blocks selected by a cryptographic key.Repeat embedding till the whole video was watermarked.To extract the information watermark,the frames holding watermark were found out by detect-ing water the symbol mark rapidly from one video segment whose length was long enough to hold the whole watermark.Then,by using the high correlations between the watermarked frame and its neighboring frames,the pixel values of the blocks where the watermark was embedded can be well estimated.Comparing the estimated values with the current val-ues in the corresponding positions,the information watermark could be reconstructed.Experimental results show that this video watermarking method is robust against attacks such as compression,scaling,frame dropping,etc.…”
    Get full text
    Article
  19. 79

    Biometric-Based Key Generation and User Authentication Using Acoustic Characteristics of the Outer Ear and a Network of Correlation Neurons by Alexey Sulavko

    Published 2022-12-01
    “…A neuro-extractor model was developed to associate a feature vector with a cryptographic key or user password. An open data set of ear canal echograms to test the performance of the proposed model was used. …”
    Get full text
    Article
  20. 80

    Secure and Privacy Enhanced Gait Authentication on Smart Phone by Thang Hoang, Deokjai Choi

    Published 2014-01-01
    “…Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. …”
    Get full text
    Article