Showing 81 - 100 results of 221 for search '"cryptographic key"', query time: 0.14s Refine Results
  1. 81

    Using software support for quantum superposition effects to speed up the solution of the targeted enumeration issue in biometric data when extracting knowledge from a neural networ... by V.I. Volchikhin, A.I. Ivanov, M.A. Shcherbakov

    Published 2024-03-01
    “…It is possible to extract knowledge from the neural network with a confidence probability of 0.97 about the cryptographic key of the user “Svoy” and about the parameters of the biometric image of the user “Svoy”.…”
    Article
  2. 82

    Cyber Attacks on Commercial Drones: A Review by Bruno Branco, Jose Silvestre Serra Silva, Miguel Correia

    Published 2025-01-01
    “…Some examples of these attacks include breaking the connection between the drone and the controller with deauthentication attacks, discovering a password or cryptographic key used in a communication protocol, gaining control of the drone through command/code injection, and attacks. …”
    Get full text
    Article
  3. 83

    Securing IPv6 Neighbor Discovery Address Resolution with Voucher-Based Addressing by Zachary T. Puhl, Jinhua Guo

    Published 2024-08-01
    “…Applying a unique concoction of cryptographic key derivation functions, link-layer address binding, and neighbor consensus on the parameters of address generation, the resolved address bindings are verifiable without the need for complex techniques that have hindered the adoption of canonical specifications.…”
    Get full text
    Article
  4. 84

    Secure file sharing with public key infrastructure (PKI) enablement / Noor Azlina Ismail @ Hassan by Ismail @ Hassan, Noor Azlina

    Published 2015
    “…The public key and private key cryptographic key pair that is obtained and shared through trusted authority will used to sign and verify the document file. …”
    Get full text
    Thesis
  5. 85

    Biometric-Based Key Generation and User Authentication Using Voice Password Images and Neural Fuzzy Extractor by Alexey Sulavko, Irina Panfilova, Daniil Inivatov, Pavel Lozhnikov, Alexey Vulfin, Alexander Samotuga

    Published 2025-01-01
    “…This work is devoted to the development of a biometric authentication system and the generation of a cryptographic key or a long password of 1024 bits based on a voice password, which ensures the protection of a biometric template from compromise. …”
    Get full text
    Article
  6. 86

    A STUDY ON BIOMETRIC TEMPLATE SECURITY by N. Radha, S. Karthikeyan

    Published 2010-07-01
    “…Biometrics offers superior security and easier than traditional identity authentication systems (based on passwords and cryptographic keys).Since biometrics characteristics are naturally related with a particular individual, making them insusceptible to being stolen, forgotten, lost or attached. …”
    Get full text
    Article
  7. 87

    Key Generation from Multibiometric System Using Meerkat Algorithm by Duha Salman, Raghad Azeez, Abdul Mohssen Hossen

    Published 2020-12-01
    “…Biometrics are short of revocability and privacy while cryptography cannot adjust the user’s identity. By obtaining cryptographic keys using biometrics, one can obtain the features such as revocability, assurance about user’s identity, and privacy. …”
    Get full text
    Article
  8. 88

    Experimental Semi-quantum Key Distribution With Classical Users by Francesco Massa, Preeti Yadav, Amir Moqanaki, Walter O. Krawec, Paulo Mateus, Nikola Paunković, André Souto, Philip Walther

    Published 2022-09-01
    “…Quantum key distribution, which allows two distant parties to share an unconditionally secure cryptographic key, promises to play an important role in the future of communication. …”
    Get full text
    Article
  9. 89

    A Blockchain-Enabled Distributed Advanced Metering Infrastructure Secure Communication (BC-AMI) by Nahida Islam, Md. Sazzadur Rahman, Imtiaz Mahmud, Md. Nur Amin Sifat, You-Ze Cho

    Published 2022-07-01
    “…The world is facing an urgent need to provide secure communication and data access control in advanced metering infrastructure (AMI) because conventional cryptographic key management and authentication protocols are at stake. …”
    Get full text
    Article
  10. 90

    Trust Model for the Russian Federation Digital Economy by Dmitry A. Melnikov, Yury F. Releev, Leonid D. Kvaratskheliya

    Published 2020-06-01
    “…At the same time, the analysis of the current state of the Russian PKI, which is characterized by the absence of a unified structure of the certification authorities (CA) and a unified federal regulatory authority in the field of cryptographic key management (public key certificates), is carried out. …”
    Get full text
    Article
  11. 91

    Securing the Internet of Medical Things with ECG‐based PUF encryption by Biagio Boi, Christian Esposito

    Published 2024-06-01
    “…Such an mechanism leverages individual ECG signals to generate a cryptographic key for encrypting and decrypting data. Due to the poor stability of the ECG signal and the typical noise existing in the measurement process for such a signal, filtering and feature extraction techniques must be adopted. …”
    Get full text
    Article
  12. 92

    A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks by Wenchao Liu, Zhenhua Zhang, Miaoxin Li, Zhenglin Liu

    Published 2014-06-01
    “…With nowadays semi/fully-invasive attack techniques attackers can directly derive the cryptographic key from non-volatile memory (NVM) storage. …”
    Get full text
    Article
  13. 93

    Tunable stochastic memristors for energy-efficient encryption and computing by Kyung Seok Woo, Janguk Han, Su-in Yi, Luke Thomas, Hyungjun Park, Suhas Kumar, Cheol Seong Hwang

    Published 2024-04-01
    “…Using these computing primitives, this work experimentally demonstrates a single system that performs cryptographic key generation, universal Boolean logic operations, and encryption/decryption. …”
    Get full text
    Article
  14. 94

    Quantum-Safe Group Key Establishment Protocol from Lattice Trapdoors by Teklay Gebremichael, Mikael Gidlund, Gerhard P. Hancke, Ulf Jennehag

    Published 2022-05-01
    “…In most instances, a group message needs to be encrypted using a cryptographic key that only devices in the group know. …”
    Get full text
    Article
  15. 95

    Highly reliable memory-based physical unclonable function using spin-transfer torque MRAM by Kong, Zhi Hui, Roy, Kaushik, Zhang, Le, Chang, Chip-Hong, Fong, Xuanyao

    Published 2015
    “…In recent years, Physical Unclonable Function (PUF) based on the inimitable and unpredictable disorder of physical devices has emerged to address security issues related to cryptographic key generation. In this paper, a novel memory-based PUF based on Spin-Transfer Torque (STT) Magnetic RAM, named as STT-PUF, is proposed as a key generation primitive for embedded computing systems. …”
    Get full text
    Get full text
    Get full text
    Conference Paper
  16. 96

    On Constructing a Secure and Fast Key Derivation Function Based on Stream Ciphers by Chuah, Chai Wen, Alawatugoda, Janaka, Arbaiy, Nureize

    Published 2024
    “…In order to protect electronic data, pseudorandom cryptographic keys generated by a standard function known as a key derivation function play an important role. …”
    Get full text
    Article
  17. 97

    A secure data authentication in wireless body area network for health monitoring using electrocardiogram-based key agreement by Ramli, Sofia Najwa, Ahmad, Rabiah, Abdollah, Mohd Faizal

    Published 2016
    “…Thus, this paper presents a new authentication protocol model that utilizes Electrocardiogram (ECG) signal as biometric as well as cryptographic key to ensure that the transmitted data are originated from the required WBAN. …”
    Get full text
    Article
  18. 98

    A secure data authentication in wireless body area network for health monitoring using electrocardiogram-based key agreement by Ramli, Sofia Najwa, Ahmad, Rabiah, Abdollah, Mohd Faizal

    Published 2016
    “…Thus, this paper presents a new authentication protocol model that utilizes Electrocardiogram (ECG) signal as biometric as well as cryptographic key to ensure that the transmitted data are originated from the required WBAN. …”
    Get full text
    Article
  19. 99

    Secure and efficient covert communication for blockchain-integrated SAGINs by Li Weijia, Zhang Yuan, He Xinyu, Song Yaqing

    Published 2024-01-01
    “…On the one hand, they require a sender to locally maintain a cryptographic key for a long period of time, which is very costly and inefficient to renew which means renewing the secret key. …”
    Get full text
    Article
  20. 100

    Side-Channel Power Resistance for Encryption Algorithms Using Implementation Diversity by Ivan Bow, Nahome Bete, Fareena Saqib, Wenjie Che, Chintan Patel, Ryan Robucci, Calvin Chan, Jim Plusquellic

    Published 2020-04-01
    “…SPREAD is designed to reduce cryptographic key related signal correlations in power supply transients by changing components of the hardware implementation on-the-fly using DPR. …”
    Get full text
    Article