2,499 resources related to Cryptographic protocols
- Topics related to Cryptographic protocols
- IEEE Organizations related to Cryptographic protocols
- Conferences related to Cryptographic protocols
- Periodicals related to Cryptographic protocols
- Most published Xplore authors for Cryptographic protocols
ICC 2021 - IEEE International Conference on Communications
IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.
Bi-Annual IEEE PES T&D conference. Largest T&D conference in North America.
The scope of the symposium includes all aspects of information theory and its applications. Itcovers a wide range of topics such as Shannon Theory, Coding Theory, and InformationSecurity as well as novel applications of information theory.
IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.
The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.
Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...
2008 2nd International Conference on Anti-counterfeiting, Security and Identification, 2008
SSL (secure sockets layer) protocol is one of key technologies to keep userpsilas data in secure transmission via Internet. This paper is present to analyze the security of SSL protocol and propose a new scheme of SSL protocol configured in the Linux operating system (OS). The experimental results show that the proposed scheme is feasible and practical as a secure ...
2008 International Conference on Computer Science and Software Engineering, 2008
Improperly managed private keys and improperly configured endpoints could result in loss of security in traditional way of message exchange. Whereas some mechanisms obtained from the new PC architecture of trusted platforms, such as seal, have exact features to deal with those deficiencies. So adopting the property-based sealing function proposed by some literates and some cryptography schemes, we put forward ...
11th International Conference on Parallel and Distributed Systems (ICPADS'05), 2005
An offline E-cash system is presented that offers appreciably greater security and better privacy than currently considered E-cash system with similar functionality. Most off-line E-cash systems use the temper-resistant IC card which controls an E-cash issued by the card issuer. Offline E-cash system based on IC card has the threats of overspending, double spending, forgery E-cash, altering/eavesdropping transaction contents, etc. ...
2010 International Conference On Computer Design and Applications, 2010
With people become increasingly dependent on computer networks, people on the requirements of security protocols, which has been realized from the initial establishment of effective communication links to provide safe and reliable communications services now. The correctness of security protocols is very important to the Network Security. There are many security flaws and loopholes in the agreement, not because of ...
2006 6th World Congress on Intelligent Control and Automation, 2006
The analysis and verification of security protocols is an important field in the security of computer nowadays. Model checking technique to the analysis of security protocols has proved remarkably successful, which involves three parts: modeling of system behaviors, description of system properties and system verification. Modeling of system behaviors is a highly challenging task because of its complexity, especially modeling ...
Geoff Mulligan: Keynote - Making Sense of IoT Protocols and Alliances: WF IoT 2016
Designing Privacy Into Internet Protocols - Juan Carlos Zuniga keynote
802.1: Higher Layer LAN Protocols
FinSAL: A Novel FinFET Based Secure Adiabatic Logic for Energy-Efficient and DPA Resistant IoT Devices - Himanshu Thapliyal: 2016 International Conference on Rebooting Computing
Internet of Things Panelist - Yen-Kuang Chen: 2016 Technology Time Machine
Computing Conversations: Van Jacobson on Content-Centric Networking
IEEE World Forum on Internet of Things - Milan, Italy - Narang N. Kishor - Designing Comprehensive and End to End IoT Solutions; Challenges, Opportunities, and Approaches to Develop New IPs - Part 3
Closing Panel at 2016 End to End Trust and Security Workshop for the Internet of Things
IEEE Entrepreneurship @ #CollisionConf: NeuroTrainer
What members say about IEEE Communications Society
USB FAST CHARGING
Geoff Mulligan: Keynote - Q and A: WF IoT 2016
NSF's Platforms for Advanced Wireless Research (PAWR) - IEEE Future Networks Webinar
Flexible Radios and Flexible Networks
Protecting Internet Traffic: Security Challenges and Solutions – IEEE Internet Initiative Webinar
SSL (secure sockets layer) protocol is one of key technologies to keep userpsilas data in secure transmission via Internet. This paper is present to analyze the security of SSL protocol and propose a new scheme of SSL protocol configured in the Linux operating system (OS). The experimental results show that the proposed scheme is feasible and practical as a secure solution for Web-based communication, and the SSL protocol is compatible to the other protocol in application layer via proper configuration.
Improperly managed private keys and improperly configured endpoints could result in loss of security in traditional way of message exchange. Whereas some mechanisms obtained from the new PC architecture of trusted platforms, such as seal, have exact features to deal with those deficiencies. So adopting the property-based sealing function proposed by some literates and some cryptography schemes, we put forward a trusted transfer model and initiate a secure provably transfer protocol. This protocol not only enhances the data security during transmission, but also ensures data security in storage.
An offline E-cash system is presented that offers appreciably greater security and better privacy than currently considered E-cash system with similar functionality. Most off-line E-cash systems use the temper-resistant IC card which controls an E-cash issued by the card issuer. Offline E-cash system based on IC card has the threats of overspending, double spending, forgery E-cash, altering/eavesdropping transaction contents, etc. To prevent the above threats, there have been a lot of technical discussions of the security requirements for theoretical offline E-cash protocols based on IC card. However, there has been little attention paid to the security requirements for practical offline E-cash system based on IC card including entity authentication, key management, implementation of cryptographic algorithm, etc. Thus, this paper describes the security requirements for cryptographic algorithms, integrity for implementation of cryptographic algorithm, authentication module, key management, and E-cash protocols
With people become increasingly dependent on computer networks, people on the requirements of security protocols, which has been realized from the initial establishment of effective communication links to provide safe and reliable communications services now. The correctness of security protocols is very important to the Network Security. There are many security flaws and loopholes in the agreement, not because of the agreement resulting from the use of cryptographic algorithms, but caused by its own structure by the agreement. In this paper, the strand space model Yahalom protocol security for a more detailed analysis and algebra for the existence of defects Yahalom protocol proposes an improved scheme. Analysis indicates that the improvement program to meet the corresponding authentication protocol and confidentiality requirements.
The analysis and verification of security protocols is an important field in the security of computer nowadays. Model checking technique to the analysis of security protocols has proved remarkably successful, which involves three parts: modeling of system behaviors, description of system properties and system verification. Modeling of system behaviors is a highly challenging task because of its complexity, especially modeling of intruder capability. A general method is proposed to construct a Promela model of the cryptographic protocol, and make use of this way to model the Helsinki protocol. The Promela model of Helsinki protocol is automatically verified by model checker Spin and an attack to Helsinki protocol has successfully been found. Experimental result shows the verification validity via message sequence chart. The general method may become a good guideline for verifying similar cryptographic protocols
Summary form only given. Quantum mechanics allows a number of communications protocols that would not be possible classically, including provably-secure messages (quantum cryptography), increased channel capacity, and the ability to transmit an unknown quantum state (quantum teleportation). Practical systems for quantum cryptography have now been demonstrated by a number of groups. I will begin by reviewing the most commonly-used methods for quantum cryptography, including the advantages and disadvantages of each in practical applications. The maximum range of current quantum cryptography systems is limited by the fact that optical amplifiers would destroy the quantum coherence of single photons and cannot be used in these kinds of systems. One potential solution to this problem is the transmission of single photons in free space, which would allow a global system for quantum cryptography based on a network of satellites and ground stations. Free-space quantum cryptography systems of that kind have now been demonstrated over relatively short distances. The range of quantum cryptography systems in optical fibers can also be extended using quantum repeaters that make use of entanglement swapping, entanglement purification, and quantum teleportation. These same techniques could also be used to implement a "quantum Internet" for the transmission of qubits from one quantum computer to another. The practical challenges that will have to be met in order to implement quantum repeaters and quantum teleportation over large distances will be discussed.
In order to study the security systems, we have developed a methodology for the application to the analysis of cryptographic protocols of the formal analysis techniques commonly used in communication protocols. In particular, we have extended the design and analysis phases with security properties. Our proposal uses a specification notation based on HMSC/MSC, which can be automatically translated into a generic SDL specification.
IPSec (IP security) and SSL (secure socket layer) have been the most robust and most potential tools available for securing communications over the Internet. Both IPSec and SSL have advantages and shortcomings. Yet no paper has been found comparing the two protocols in terms of characteristic and functionality. Our objective is to present an analysis of security and performance properties for IPSec and SSL.
We performed a simulation of the quantum cryptographic B92 protocol, using coherent continuum states, in the plug and play system. We observed fluctuations of the mean photon number in the pulses that arrive at the receiver, introduced by the statistical property of the simulation. This fluctuation simulates the presence of a classical noise source in the system that occurs in practical systems.
In this paper, we propose new algorithms for multiple modular exponentiation operations. The major aim of these algorithms is to speed up the performance of some cryptographic protocols based on multiexponentiation. Our new algorithms are based on binary-like complex arithmetic, introduced by K. Pekmestzi (1989) and generalized in this paper.
The project defines a standard for high-speed (>100 Mbps at the physical layer) communication devices via electric power lines, so-called broadband over power line (BPL) devices. This standard uses transmission frequencies below 100 MHz. It is usable by all classes of BPL devices, including BPL devices used for the first-mile/last-mile connection (<1500 m to the premise) to broadband services as ...
This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.
For the purpose of providing compatible authentication, authorization, and cryptographic key agreement mechanisms to support secure communication between devices connected by IEEE 802ﾮ Local Area Networks (LANs), this standard a) Specifies a general method for provision of port-based network access control. b) Specifies protocols that establish secure associations for IEEE Std 802.1AEﾙ MAC Security. c) Facilitates the use of industry ...