Enhanced Security Technique for Adhoc Transmission Using Hyper Elliptic Curve
K Sudharson, SP Panimalar, C Ambhika… - 2023 7th …, 2023 - ieeexplore.ieee.org
The popular cryptosystem technology with a realistic way to a highly secure and a smaller
encryption bit size is known as Hyper Elliptical Curve Cryptography (HECC). The key …
encryption bit size is known as Hyper Elliptical Curve Cryptography (HECC). The key …
A key agreement protocol with partial backward confidentiality
The essence of dynamic group key agreement protocols is to help compute a secure key for
a group communication with a dynamic set of participants in distributed systems. In dynamic …
a group communication with a dynamic set of participants in distributed systems. In dynamic …
Signcryption based hyper elliptical cureve cryptography framework for key escrow in manet
B Vanathy, M Ramakrishnan - International Journal of Advanced …, 2020 - papers.ssrn.com
Hyper elliptical curve cryptography is the prominent public key encrypto systems with
practical approach to high level of security and shorter bit size of encryption. Public key …
practical approach to high level of security and shorter bit size of encryption. Public key …
Time slot based data sharing with time slot based password
P Baskaran, EG Anurag, S Kaviyarasu… - … on Innovations in …, 2017 - ieeexplore.ieee.org
This approach has taken a review of time slot based password technique in which the
password is used only once for each and when time slot ends the password is not useful …
password is used only once for each and when time slot ends the password is not useful …
Write-only limited-read filesystem
A secure filesystem provides write-only access with limited read. The filesystem stores data
as an encrypted block on a user machine using a symmetric (active) key, along with …
as an encrypted block on a user machine using a symmetric (active) key, along with …
Análise do OpenAFS sob a perspectiva da segurança em sistemas de arquivos distribuídos
FM Borges - 2019 - realp.unb.br
As mais recentes abordagens ligadas à segurança em Sistemas de Arquivos Distribuídos
(SAD) envolvem a aplicação de técnicas que garantam rigorosos níveis de disponibilidade …
(SAD) envolvem a aplicação de técnicas que garantam rigorosos níveis de disponibilidade …
[PDF][PDF] Implementation of kerberos based authenticated key exchange protocol for parallel network file systems in cloud
C Chandravathi, K Somasundaram, R Kandasamy… - IIOAB JOURNAL, 2016 - iioab.org
SUBJECT CLASSIFICATION (Example: RNOMICS) Page 1 SPECIAL ISSUE: Emerging
Technologies in Networking and Security (ETNS) Chandravathi et al …
Technologies in Networking and Security (ETNS) Chandravathi et al …
Key Exchange Protocols for Parallel Network File Systems Using Optimized Cryptography
IA Lafta, RA Khamees… - IOP Conference Series …, 2020 - iopscience.iop.org
The utilization of parallel file system is expanding quickly nowadays; security moves toward
becoming are significant worry about inside this work is to structure capable and secure …
becoming are significant worry about inside this work is to structure capable and secure …
[PDF][PDF] Session Key Generation and Distribution Using Trusted Third Party and Symmetric Key Cryptography
A KUMAR, K PUROHIT - researchgate.net
The session keys are established and shared using key establishment protocols. Here, in
this model a key generation and sharing protocol using a secure Trusted Third Party (TTP) is …
this model a key generation and sharing protocol using a secure Trusted Third Party (TTP) is …
Integrity and Privacy through Authentication Key Exchange Protocols for Distributed Systems
B Usharani - Asian Journal of Engineering and Applied Technology, 2017 - ajeat.com
Networking is the practice of connecting several computing devices together in order to
share resources. In real world, attacks via force and fraud are privacy (unauthorized release …
share resources. In real world, attacks via force and fraud are privacy (unauthorized release …