RPS Ahuja, F Lakhani - US Patent 8,447,722, 2013 - Google Patents
(57) ABSTRACT A method is provided in one example and includes generating a query for a database for information stored in the database. The information relates to data discovered …
Background: This research aims to identify how blockchain technology could support the ecological embeddedness of the coffee supply chain. Ecological embeddedness is a subset …
We consider the security of message authentication code (MAC) algorithms, and the construction of MACs from fast hash functions. A new forgery attack applicable to all iterated …
Biosensor is a means to transmit some physical phenomena, like body temperature, pulse, respiratory rate, electroencephalogram (EEG), electrocardiogram (ECG), and blood …
M Just, S Vaudenay - … —ASIACRYPT'96: International Conference on the …, 1996 - Springer
We examine key agreement protocols providing (i) key authentication (ii) key confirmation and (iii) forward secrecy. Attacks are presented against previous two-party key agreement …
Counterfeit medicines are a healthcare security problem, posing not only a direct threat to patient safety and public health but also causing heavy economic losses. Current …