Algorithms, Free Full-Text
Por um escritor misterioso
Last updated 23 setembro 2024
Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Internet of Things, intelligent transportation systems (ITS), Vehicular Ad Hoc Network (VANET). This is due to the fact that authentication protocols effectively resist a number of attacks on wireless data transmission channels in these systems. The main disadvantage of most authentication protocols is the use of symmetric and asymmetric encryption systems to ensure high cryptographic strength. As a result, there is a problem in delivering keys to the sides of the prover and the verifier. At the same time, compromising of keys will lead to a decrease in the level of protection of the transmitted data. Zero-knowledge authentication protocols (ZKAP) are able to eliminate this disadvantage. However, most of these protocols use multiple rounds to authenticate the prover. Therefore, ZKAP, which has minimal time costs, is developed in the article. A scheme for adapting protocol parameters has been developed in this protocol to increase its efficiency. Reductions in the level of confidentiality allow us to reduce the time spent on the execution of the authentication protocol. This increases the volume of information traffic. At the same time, an increase in the confidentiality of the protocol entails an increase in the time needed for authentication of the prover, which reduces the volume of information traffic. The FPGA Artix-7 xc7a12ticsg325-1L was used to estimate the time spent implementing the adaptive ZKAP protocol. Testing was performed for 32- and 64-bit adaptive authentication protocols.
Learn Classification and Types of Machine Learning Algorithms
Everything You Need to Know About Social Media Algorithms
Full-Text Search: What Is It And How It Works, MongoDB
Article recommendation with Personalized PageRank and Full Text
What influences algorithmic decision-making? A systematic
Algorithms by Jeff Erickson : Jeff Erickson : Free Download
SOLUTION: Design and analysis of algorithms handwritten notes pdf
Large Scale Text Search Algorithm with Tries: A Tutorial
PDF) Comparison of quantification algorithms for circulating cell
Algorithms full tutorial
Deriving objectively-measured sedentary indices from free-living
Recomendado para você
-
All Roblox Project New World Codes (December 2023) [Haze Piece]23 setembro 2024
-
Project New World codes23 setembro 2024
-
Roblox Project New World Codes (September 2021)23 setembro 2024
-
Project New World Codes - XP and Money Boost (December 2023)23 setembro 2024
-
Roblox - Códigos para o Project New World (julho 2023) - Critical Hits23 setembro 2024
-
New World23 setembro 2024
-
Beyond Conversations: Code, Protection, and the Personalization Paradox in the AI Age🚀23 setembro 2024
-
Slavery - Wikipedia23 setembro 2024
-
E3 2021: Does Xbox and Bethesda's impressive showcase show Microsoft's big gaming bet is paying off?23 setembro 2024
-
Discover the Best Project New World Codes for Epic Rewards - 2023 December-Redeem Code-LDPlayer23 setembro 2024
você pode gostar
-
20 Developer for Hair Old Lady Wig Granny Cosplay Wig23 setembro 2024
-
Accuracy stats for KBM vs Controller : r/halo23 setembro 2024
-
Personal Copilot: Train Your Own Coding Assistant23 setembro 2024
-
SCP - 173 Variant 7, Variant Codename : The Totem23 setembro 2024
-
23 Quick saves ideas mehndi designs for hands, mehndi designs for beginners, mehndi designs23 setembro 2024
-
Tamaki Hinoemata, Inou Battle wa Nichijou-kei no Naka de Wiki23 setembro 2024
-
Back 4 Blood: How to Turn On Crossplay – GameSkinny23 setembro 2024
-
Codigos GTA San Andreas, PDF, Tráfego23 setembro 2024
-
Mew Pokemon GO Wiki - GamePress23 setembro 2024
-
INVINCIBLE on X: Time to start working on Season 2! / X23 setembro 2024