A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Cryptography and the internet
[chapter]
1998
Lecture Notes in Computer Science
After many years, cryptography is coming to the Internet. Some protocols are in common use; more are being developed and deployed. ...
The major issue has been one of cryptographic engineering: turning academic papers into a secure, implementable specification. ...
What Cryptography Can't Do Cryptography is not a panacea for the security problems of the Internet. ...
doi:10.1007/bfb0055719
fatcat:k5rwymx5m5hr7enxxa77jkzll4
Cryptography and the internet: Lessons and challenges
[chapter]
1996
Lecture Notes in Computer Science
Cryptography is a fundamental technology used to provide security of computer networks, and there is currently a widespread engineering effort to incorporate cryptography into various aspects of the Internet ...
The popularization of the Internet has brought fundamental changes to the world, because it allows a universal method of communication between computers. ...
Looking forward in time and predicting the next trend in cryptography is a risky business, but I believe that the Internet will also mark a sea change in the development and use of cryptography. ...
doi:10.1007/bfb0034834
fatcat:2n2vliaku5a7bbkg3rgda2fuq4
Quantum Cryptography: The Future of Internet and Security Management
2021
Journal of Management and Service Science (JMSS)
field, and the possible future of quantum cryptography. ...
In this paper, I am going to brief the concepts of Quantum Cryptography and how this technology has led to the development of the strategy of complete secure key distribution. ...
Authentication
Analysis of Quantum Cryptography Implementation Security for internet communication network in the future should be guaranteed as everything done is online and all the information are ...
doi:10.54060/jmss/001.01.004
fatcat:f6qox5vmxvbqfaqlkiux5atwoy
Lightweight Cryptography and RFID: Tackling the Hidden Overhead
2010
KSII Transactions on Internet and Information Systems
The field of lightweight cryptography has developed significantly over recent years and many impressive implementation results have been published. ...
Interestingly, the implementation requirements still remain within the typically-cited limits for on-the-tag cryptography. ...
Acknowledgements We would like to thank Loïc Juniot, Marc Girault, Henri Gilbert, and Peter Langendörfer for their help and contributions. ...
doi:10.3837/tiis.2010.04.002
fatcat:pdysk7zdwvhjbcgeqhfvnfktqm
Quantum resistant public key cryptography
2009
Proceedings of the 8th Symposium on Identity and Trust on the Internet - IDtrust '09
Public key cryptography is widely used to secure transactions over the Internet. ...
based attacks and discuss some of the issues that protocol designers may need to consider if there is a need to deploy these algorithms at some point in the future. ...
It has been used to verify the authenticity of software and legal records, to protect financial transactions, and to protect the transactions of millions of Internet users on a daily basis. ...
doi:10.1145/1527017.1527028
dblp:conf/idtrust/PerlnerC09
fatcat:ejh6oz6a55cx3n5p4mtxmcaf7i
Secure Communication across the Internet by Encrypting the Data using Cryptography and Image Steganography
2020
International Journal of Advanced Computer Science and Applications
It routes a tremendous way to do this, the most popular one is cryptography, and another is steganography. ...
Anteriorly there subsist many ways in these techniques like Image Steganography, Secret key Cryptography, LSB method, and so on which are being used to encrypt data and secure communication. ...
digital object will be ordinary to all over the world as the cryptography is masking only on the content of the message and sending to the end receiver it may have some more reveal factor to the world ...
doi:10.14569/ijacsa.2020.0111057
fatcat:7tapqgrvmbalfifgazhsbtnhae
Stone Knives and Bear Skins: Why Does the Internet Run on Pre-historic Cryptography?
[chapter]
2011
Lecture Notes in Computer Science
While cryptography has advanced greatly since since 2001, Internet security protocols have not. Here is a list of the algorithms that are used in common SSL/TLS stacks: ...
The situation is similar for other protocols such as IPsec and S/MIME. ...
Despite this, implementors and users have responded either by ignoring these issues or by adding layers of countermeasures to the attacks which are presently known. ...
doi:10.1007/978-3-642-25578-6_24
fatcat:ylrlqk6ldjajbjkx5vy2y4vkna
Efficiency of Using the Diffie-Hellman Key in Cryptography for Internet Security
2021
Turkish Journal of Computer and Mathematics Education
Network security has become more important to not public computer users, organizations, and the military.With the start of the internet, security became a major disquiet and the history of security allows ...
The internet structure itself allowed for many security threats to occur.When the architecture of the internet is modified it can decrease the possible attacks that can be sent across the network. ...
The firms produce an "internet" to stay on the world wide web but procured from potential dangers. ...
doi:10.17762/turcomat.v12i6.4807
fatcat:hs4phyzbpndmbo6vuputqfsfai
The Improvement of the CurveCP Cryptography for enhancing the secure of Internet of Things
2021
VNU Journal of Science Computer Science and Communication Engineering
Our team also improved and implemented CurveCP which is one of these Lightweight cryptographies in the Wireless sensor Networks (WSN) so as to enhance data secure and information security of IoT System ...
With the development of Information Technology, Internet of Things (IoT) has been applied widely in human civilization, but it leads the increase of the risk about information security. ...
Acknowledgements Our team sends the gratefulness to tutors and the colleagues for providing adequate support about infrastructure and advice during the researching process. ...
doi:10.25073/2588-1086/vnucsce.282
fatcat:vwv54j47tnfdnenuabltkxzjy4
The Perception Layer Information Security Scheme for Internet of Things Based on Lightweight Cryptography
2018
DEStech Transactions on Computer Science and Engineering
Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices
2015
2015 International Workshop on Secure Internet of Things (SIoT)
40% and that memory instructions reduce the predictability of our energy model. ...
In this way, we assess the additional energy consumption of using different SCA countermeasures and using lightweight block ciphers on 32 bit embedded devices. ...
[8] looks at the energy cost, and other features, of lightweight cryptography in hardware. ...
doi:10.1109/siot.2015.11
dblp:conf/siot/McCannEO15
fatcat:ec5cta66pzha7iuu3wlejsm4eu
A Logical Issue for the Internet Community to Address Is That of Effective Cryptography Standards for the Conduct of Business and Personal Communications
2013
IOSR Journal of Computer Engineering
The need for having three encryption techniques has also been encrypted .A detailed discussion has been done on the classical cryptography and the drawbacks of the classical cryptography to ensure the ...
need for going to new trends in cryptography like quantum cryptography, elliptic curve cryptography. ...
Cryptography is a tool which may alleviate many of the perceived problems of using the Internet for communications. ...
doi:10.9790/0661-1450131
fatcat:6azsldskp5abfgubwmkdfg3oki
Threshold Cryptography-based Group Authentication (TCGA) scheme for the Internet of Things (IoT)
2014
2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)
Internet of things (IoT) is an emerging paradigm where the devices around us (persistent and non-persistent) are connected to each other to provide seamless communication, and contextual services. ...
This paper presents novel Threshold Cryptography-based Group Authentication (TCGA) scheme for the IoT which verifies authenticity of all the devices taking part in the group communication. ...
Introduction The Internet of Things (IoT) refers to the network interconnection of everyday devices. ...
doi:10.1109/vitae.2014.6934425
dblp:conf/vitae/MahallePP14
fatcat:k656qdlcobgq7a7nbojcqinda4
Compiler Assisted Elliptic Curve Cryptography
[chapter]
On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS
Our results, which focus on Elliptic Curve Cryptography (ECC), show that a suitable language allows description of ECC based software in a manner close to the original mathematics; the corresponding compiler ...
The use of domain specific language and compiler techniques to assist in description and optimisation of cryptographic software is an interesting research challenge. ...
Acknowledgements The authors would like to thank various anonymous referees for their helpful comments, and Gregory Zaverucha for pointing out the automated method to generate modular reduction functions ...
doi:10.1007/978-3-540-76843-2_46
dblp:conf/otm/BarbosaMP07
fatcat:q6cbgni2zfapth7meffrm7z6au
The Perception Layer Information Secu-rity Scheme for Internet of Things based on Lightweight Cryptography
2013
Proceedings of the 2013 International Conference on Information, Business and Education Technology (ICIBET-2013)
unpublished
In smart chip of sensor/RFID reader device and encrypt card of the authentication center in the internet of things(IoT), the device authentication, signature/verification and encryption/decryption protocols ...
This paper uses the lightweight (simple cryptography, high security and fast speed single-key cryptographic algorithms such as: RC4, RC5, SMS4 etc.) cryptography, and a security single-key management technology ...
That is, the lightweight cryptography, hash algorithm and security protocols of sensing device which include authentication protocol, signature/encryption protocol are written into the smart chip. ...
doi:10.2991/icibet.2013.6
fatcat:ol7ypd7utvftjlx6dvxxe7nnm4
« Previous
Showing results 1 — 15 out of 38,042 results