-
61
Securing Telecommunication Based On Speaker Voice As The Public Key.
Published 2007“…This paper proposes a technique to generate a public cryptographic key from user’s voice while speaking over a handheld device. …”
Get full text
Article -
62
New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets.
Published 2007“…In this paper, we propose a new cryptographic key exchange protocol based on Mandelbrot and Julia Fractal sets. …”
Get full text
Article -
63
Secured telemetry based on time-variant sensing matrix – An empirical study of spectroscopic profiling
Published 2023-10-01“…Time-variant sub-Nyquist sensing matrix is designed as a dynamic cryptographic key to secure the node-to-node signal transmission. …”
Get full text
Article -
64
KERBEROS SECURITY EVALUATION
Published 2008-09-01“…Smart card can enhance the security by storing the cryptographic key to perform dual factor authentication, it also can manage the encryption and decryption of the Kerberos keys on it rather then on the client workstation memory. …”
Get full text
Article -
65
Security Verification in the Context of 5G Sensor Networks
Published 2021-06-01“…The scheme may be implemented, for instance, in the TLS/DTLS protocol to create a secure cryptographic key exchange mechanism. The aim of the publication is to demonstrate that automated symbolic analysis may be relied upon to model 5G sensor networks security protocols. …”
Get full text
Article -
66
A Generic Security Proof for Quantum Key Distribution
Published 2004“…Quantum key distribution allows two parties, traditionally known as Alice and Bob, to establish a secure random cryptographic key if, firstly, they have access to a quantum communication channel, and secondly, they can exchange classical public messages which can be monitored but not altered by an eavesdropper, Eve. …”
Journal article -
67
Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing
Published 2016-09-01“…It is also often used as a measure of the unpredictability of a cryptographic key in cryptography research areas. Ubiquitous computing (Ubi-comp) has emerged rapidly as an exciting new paradigm. …”
Get full text
Article -
68
Plactic key agreement (insecure?)
Published 2023-02-01“…Plactic key agreement is a new type of cryptographic key agreement that uses Knuth’s multiplication of semistandard tableaux from combinatorial algebra. …”
Get full text
Article -
69
Tackling Denial of Service Attacks on Key Management in Software-Defined Quantum Key Distribution Networks
Published 2022-01-01“…A QKD network provides an additional security layer for IT-secure cryptographic key distribution that is added to existing conventional networks. …”
Get full text
Article -
70
Proposed Hybrid Approach of Stream Cipher base on Selector of Encryption operation and Key Symmetric translate
Published 2011-08-01“…A stream cipher is a method of encrypting text (to produce cipher text) in which a cryptographic key and algorithm are applied to each binary digit in a data stream, one bit at a time. …”
Get full text
Article -
71
Software implementation of side-channel analysis on AES encryption with different key length
Published 2022“…This leads to side-channel attacks (SCA) which can be used for exploiting the leakage to recover the cryptographic key. In order to increase the resistance against side-channel attacks, one way is to increase the key search complexity of encryption by increasing the key length. …”
Get full text
Final Year Project (FYP) -
72
Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms
Published 2014-01-01“…This paper produces a new cryptographic key generation approach that investigate from metaheuristic algorithms (Greedy Randomized Adaptive Search Procedure (GRASP) and Variable Neighborhood Search(VNS)) in order generate symmetric mask key that consist of more the one EC points with minimum correlation among points. …”
Get full text
Article -
73
Low Mismatch Key Agreement Based on Wavelet-Transform Trend and Fuzzy Vault in Body Area Network
Published 2013-06-01“…By exploiting the high correlation of received signal strength index (RSSI) between peer-to-peer communications, our scheme can provide a shared symmetric cryptographic key under the presence of an eavesdropper. …”
Get full text
Article -
74
Enhancing the SRAM PUF with an XOR Gate
Published 2024-11-01“…This was implemented using a readily available development board, SRAM devices, and a user-friendly custom circuit board for cryptographic key generation. The cryptographic protocol was implemented using both C++ and python3. …”
Get full text
Article -
75
Blind video watermarking algorithm based on correlations between neighboring frames
Published 2006-01-01“…A blind video watermarking method was proposed,in which the watermark composed of symbol part and in-formation part was embedded into the original video frames.After some video frames hiding the watermark were selected randomly from one segment of the video sequences,the symbol water mark was embedded into low frequency discrete cosine transform(DCT) coefficients of fixed blocks of such frames,whereas the information water mark was embedded into direct current coefficients of some other blocks selected by a cryptographic key.Repeat embedding till the whole video was watermarked.To extract the information watermark,the frames holding watermark were found out by detect-ing water the symbol mark rapidly from one video segment whose length was long enough to hold the whole watermark.Then,by using the high correlations between the watermarked frame and its neighboring frames,the pixel values of the blocks where the watermark was embedded can be well estimated.Comparing the estimated values with the current val-ues in the corresponding positions,the information watermark could be reconstructed.Experimental results show that this video watermarking method is robust against attacks such as compression,scaling,frame dropping,etc.…”
Get full text
Article -
76
Guaranteeing Spoof-Resilient Multi-Robot Networks
Published 2015“…This paper proposes a new solution to defend against the Sybil attack, without requiring expensive cryptographic key-distribution. Our core contribution is a novel algorithm implemented on commercial Wi-Fi radios that can "sense" spoofers using the physics of wireless signals. …”
Get full text
-
77
Improving Error Correction Stage and Expanding the Final Key using Dynamic Linear-feedback Shift Register in Sarg04 Protocol
Published 2019-04-01“…The mechanism of quantum mechanics is considered as the principal method of quantum key distribution for transmitting a cryptographic key between users in unconditionally secure communication. …”
Get full text
Article -
78
Blind video watermarking algorithm based on correlations between neighboring frames
Published 2006-01-01“…A blind video watermarking method was proposed,in which the watermark composed of symbol part and in-formation part was embedded into the original video frames.After some video frames hiding the watermark were selected randomly from one segment of the video sequences,the symbol water mark was embedded into low frequency discrete cosine transform(DCT) coefficients of fixed blocks of such frames,whereas the information water mark was embedded into direct current coefficients of some other blocks selected by a cryptographic key.Repeat embedding till the whole video was watermarked.To extract the information watermark,the frames holding watermark were found out by detect-ing water the symbol mark rapidly from one video segment whose length was long enough to hold the whole watermark.Then,by using the high correlations between the watermarked frame and its neighboring frames,the pixel values of the blocks where the watermark was embedded can be well estimated.Comparing the estimated values with the current val-ues in the corresponding positions,the information watermark could be reconstructed.Experimental results show that this video watermarking method is robust against attacks such as compression,scaling,frame dropping,etc.…”
Get full text
Article -
79
Biometric-Based Key Generation and User Authentication Using Acoustic Characteristics of the Outer Ear and a Network of Correlation Neurons
Published 2022-12-01“…A neuro-extractor model was developed to associate a feature vector with a cryptographic key or user password. An open data set of ear canal echograms to test the performance of the proposed model was used. …”
Get full text
Article -
80
Secure and Privacy Enhanced Gait Authentication on Smart Phone
Published 2014-01-01“…Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. …”
Get full text
Article