Algorithms, Free Full-Text
Por um escritor misterioso
Last updated 05 novembro 2024
Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Internet of Things, intelligent transportation systems (ITS), Vehicular Ad Hoc Network (VANET). This is due to the fact that authentication protocols effectively resist a number of attacks on wireless data transmission channels in these systems. The main disadvantage of most authentication protocols is the use of symmetric and asymmetric encryption systems to ensure high cryptographic strength. As a result, there is a problem in delivering keys to the sides of the prover and the verifier. At the same time, compromising of keys will lead to a decrease in the level of protection of the transmitted data. Zero-knowledge authentication protocols (ZKAP) are able to eliminate this disadvantage. However, most of these protocols use multiple rounds to authenticate the prover. Therefore, ZKAP, which has minimal time costs, is developed in the article. A scheme for adapting protocol parameters has been developed in this protocol to increase its efficiency. Reductions in the level of confidentiality allow us to reduce the time spent on the execution of the authentication protocol. This increases the volume of information traffic. At the same time, an increase in the confidentiality of the protocol entails an increase in the time needed for authentication of the prover, which reduces the volume of information traffic. The FPGA Artix-7 xc7a12ticsg325-1L was used to estimate the time spent implementing the adaptive ZKAP protocol. Testing was performed for 32- and 64-bit adaptive authentication protocols.
Top 10 Machine Learning Algorithms for Beginners
Screening for extranodal extension in HPV-associated oropharyngeal
Psycho Tropical Berlin Rym - Colaboratory
Free Algorithms Book
15 Best Data Structures and Algorithms Courses (Free & Paid
Genetic Algorithms Software Testing - Colaboratory
Validation of automatic wear-time detection algorithms in a free
Large Scale Text Search Algorithm with Tries: A Tutorial
Beyond the Worst-Case Analysis of Algorithms
Recomendado para você
-
NEW CODES* PROJECT NEW WORLD ROBLOX05 novembro 2024
-
All The Races In Roblox Project New World, Ranked05 novembro 2024
-
Anime Lost Simulator Codes - Roblox05 novembro 2024
-
CODE] HAZE PIECE - Roblox05 novembro 2024
-
135K CODE] Project New World, Roblox GAME, ALL SECRET CODES, ALL WORKING CODES05 novembro 2024
-
Elections in digital times: a guide for electoral practitioners05 novembro 2024
-
Purkinje cell dopaminergic inputs to astrocytes regulate cerebellar-dependent behavior05 novembro 2024
-
ALL NEW *SECRET* CODES in PROJECT NEW WORLD CODES! (Roblox Project New World Codes)05 novembro 2024
-
NEW UPDATE CODES* [135K CODE] Project New World ROBLOX, ALL CODES05 novembro 2024
-
FUTURE CODES!! *NEW* ROBLOX PROJECT NEW WORLD CODES 2023! (135K CODE)05 novembro 2024
você pode gostar
-
Buy Mafia III Definitive Edition Steam Key PC05 novembro 2024
-
Sidney Prescott, Scream Wiki05 novembro 2024
-
FREE Course Certificate Template - Download in Word, Google Docs05 novembro 2024
-
Jogo playstation 4 five nights fere05 novembro 2024
-
Peaky Blinders Creator Explains Meaning Behind Ruby's Fever Dream05 novembro 2024
-
BRAND NEW CODE & How SSS 2.0 Can Continue To Be GREAT! (Sonic05 novembro 2024
-
Flyhunter Origins - Metacritic05 novembro 2024
-
Abertura Inglesa - Armadilhas na Abertura #56 - Xadrez Relâmpago05 novembro 2024
-
Logo Roblox 3D LED LAMP with base of your choice ! - PictyourLamp05 novembro 2024
-
Cuánto gana Ari Gameplays al mes por hacer transmisiones? Te contamos05 novembro 2024