Enhanced Security Technique for Adhoc Transmission Using Hyper Elliptic Curve

K Sudharson, SP Panimalar, C Ambhika… - 2023 7th …, 2023 - ieeexplore.ieee.org
The popular cryptosystem technology with a realistic way to a highly secure and a smaller
encryption bit size is known as Hyper Elliptical Curve Cryptography (HECC). The key …

A key agreement protocol with partial backward confidentiality

O Ermiş, Ş Bahtiyar, E Anarım, MU Çağlayan - Computer Networks, 2017 - Elsevier
The essence of dynamic group key agreement protocols is to help compute a secure key for
a group communication with a dynamic set of participants in distributed systems. In dynamic …

Signcryption based hyper elliptical cureve cryptography framework for key escrow in manet

B Vanathy, M Ramakrishnan - International Journal of Advanced …, 2020 - papers.ssrn.com
Hyper elliptical curve cryptography is the prominent public key encrypto systems with
practical approach to high level of security and shorter bit size of encryption. Public key …

Time slot based data sharing with time slot based password

P Baskaran, EG Anurag, S Kaviyarasu… - … on Innovations in …, 2017 - ieeexplore.ieee.org
This approach has taken a review of time slot based password technique in which the
password is used only once for each and when time slot ends the password is not useful …

Write-only limited-read filesystem

JJB Lum, A Youssef, DJ Arroyo - US Patent 10,733,306, 2020 - Google Patents
A secure filesystem provides write-only access with limited read. The filesystem stores data
as an encrypted block on a user machine using a symmetric (active) key, along with …

Análise do OpenAFS sob a perspectiva da segurança em sistemas de arquivos distribuídos

FM Borges - 2019 - realp.unb.br
As mais recentes abordagens ligadas à segurança em Sistemas de Arquivos Distribuídos
(SAD) envolvem a aplicação de técnicas que garantam rigorosos níveis de disponibilidade …

[PDF][PDF] Implementation of kerberos based authenticated key exchange protocol for parallel network file systems in cloud

C Chandravathi, K Somasundaram, R Kandasamy… - IIOAB JOURNAL, 2016 - iioab.org
SUBJECT CLASSIFICATION (Example: RNOMICS) Page 1 SPECIAL ISSUE: Emerging
Technologies in Networking and Security (ETNS) Chandravathi et al …

Key Exchange Protocols for Parallel Network File Systems Using Optimized Cryptography

IA Lafta, RA Khamees… - IOP Conference Series …, 2020 - iopscience.iop.org
The utilization of parallel file system is expanding quickly nowadays; security moves toward
becoming are significant worry about inside this work is to structure capable and secure …

[PDF][PDF] Session Key Generation and Distribution Using Trusted Third Party and Symmetric Key Cryptography

A KUMAR, K PUROHIT - researchgate.net
The session keys are established and shared using key establishment protocols. Here, in
this model a key generation and sharing protocol using a secure Trusted Third Party (TTP) is …

Integrity and Privacy through Authentication Key Exchange Protocols for Distributed Systems

B Usharani - Asian Journal of Engineering and Applied Technology, 2017 - ajeat.com
Networking is the practice of connecting several computing devices together in order to
share resources. In real world, attacks via force and fraud are privacy (unauthorized release …