In modern security models, cryptography plays a funda-mental role in protecting data integrity and confidential-ity in information systems. However, cryptography itself is subject to cryptanalysis attacks. To reduce the crypt-analysis attack risk, a dynamic key theory is presented and analyzed in this paper. Because these dynamic keys are one-time used symmetric cryptographic keys, they can significantly improve the security of cryptographic sys-tems. The dynamic key theory generation scheme and key update mechanism are formally analyzed to demon-strate balance between security and performance. The theory can be applied to enhance the security and perfor-mance of cryptographic systems, especially those used in wireless networks communicatio...
Abstract The use of mobile phones became vital in our everyday life. This emergence has led many com...
Cryptography is a mathematical technique that plays an important role in information security techni...
Conventional cryptography systems use a static key or a pair of keys for the encryption and decrypti...
This dissertation focuses on both theoretic and practical aspects of using a new approach, dynamic s...
This dissertation focuses on both theoretic and practical aspects of using a new approach, dynamic s...
Cryptography is the science of encrypting the information so that it is rendered unreadable for an i...
Data security is an essential component of an organization in order to keep the information safe fro...
With the widespread use of wireless network services and applications, security is a major concern. ...
For the source limitations and vulnerabilities of the sensor nodes of Wireless Sensor Networks, we p...
Copyright © 2015 ISSR Journals. This is an open access article distributed under the Creative Common...
Using Grid Storage, users can remotely store their data and enjoy the on-demand high quality applica...
An integrated and optimized smart grid cannot be achieved without a secure communication network. Du...
This paper introduces a set of low-complexity algorithms that when coupled with link layer retransmi...
In modern day technology, the Information Society is at risk. Passwords are a multi-user computer sy...
International audienceSecurity attacks are constantly on the rise leading to drastic consequences. S...
Abstract The use of mobile phones became vital in our everyday life. This emergence has led many com...
Cryptography is a mathematical technique that plays an important role in information security techni...
Conventional cryptography systems use a static key or a pair of keys for the encryption and decrypti...
This dissertation focuses on both theoretic and practical aspects of using a new approach, dynamic s...
This dissertation focuses on both theoretic and practical aspects of using a new approach, dynamic s...
Cryptography is the science of encrypting the information so that it is rendered unreadable for an i...
Data security is an essential component of an organization in order to keep the information safe fro...
With the widespread use of wireless network services and applications, security is a major concern. ...
For the source limitations and vulnerabilities of the sensor nodes of Wireless Sensor Networks, we p...
Copyright © 2015 ISSR Journals. This is an open access article distributed under the Creative Common...
Using Grid Storage, users can remotely store their data and enjoy the on-demand high quality applica...
An integrated and optimized smart grid cannot be achieved without a secure communication network. Du...
This paper introduces a set of low-complexity algorithms that when coupled with link layer retransmi...
In modern day technology, the Information Society is at risk. Passwords are a multi-user computer sy...
International audienceSecurity attacks are constantly on the rise leading to drastic consequences. S...
Abstract The use of mobile phones became vital in our everyday life. This emergence has led many com...
Cryptography is a mathematical technique that plays an important role in information security techni...
Conventional cryptography systems use a static key or a pair of keys for the encryption and decrypti...