A unique overview of network security issues, solutions, and methodologies at an architectural and research level Network Security provides the latest research and …
Data analytic has recently enabled the uncovering of interesting properties of several complex networks. Among these, it is worth considering the bitcoin blockchain, because of …
S Ghimire, JY Choi, B Lee - IEEE Transactions on Multimedia, 2019 - ieeexplore.ieee.org
A video record plays a crucial role in providing evidence for crime scenes or road accidents. However, the main problem with the video record is that it is often vulnerable to various …
YP Luo, T Hwang - Quantum Information Processing, 2016 - Springer
This study presents the first two authenticated semi-quantum direct communication protocols without using any classical channel. By pre-sharing a master secret key between two …
DJ Rani, SE Roslin - 2016 Online international conference on …, 2016 - ieeexplore.ieee.org
Internet of things (IoT) is communication between smart objects and human. It finds enormous applications in the field of healthcare monitoring, information management …
JC Mogul - US Patent 7,315,884, 2008 - Google Patents
A system and method for comparing a digest value in an incoming response to a digest index (eg, a hash table). The digest index includes digest values of data objects already …
YP Luo, CY Lin, T Hwang - Quantum information processing, 2014 - Springer
This work proposes a quantum dialogue (QD) based on single photons, which not only allows two communicants to exchange their secret messages simultaneously via a one-step …
S Walmsley, P Lapstun - US Patent App. 10/203,559, 2003 - Google Patents
This invention is a validation protocol for determining whether an untrusted authentication chip is valid, or not. In another aspect it concerns a validation System for the protocol. The …
SR Walmsley - US Patent 6,816,968, 2004 - Google Patents
Manufacturers of Systems that require consumables, Such as a laser printer that requires toner cartridges, have Struggled with the problem of authenticating consumables, to varying …