Algorithms, Free Full-Text
Por um escritor misterioso
Last updated 17 junho 2024
Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Internet of Things, intelligent transportation systems (ITS), Vehicular Ad Hoc Network (VANET). This is due to the fact that authentication protocols effectively resist a number of attacks on wireless data transmission channels in these systems. The main disadvantage of most authentication protocols is the use of symmetric and asymmetric encryption systems to ensure high cryptographic strength. As a result, there is a problem in delivering keys to the sides of the prover and the verifier. At the same time, compromising of keys will lead to a decrease in the level of protection of the transmitted data. Zero-knowledge authentication protocols (ZKAP) are able to eliminate this disadvantage. However, most of these protocols use multiple rounds to authenticate the prover. Therefore, ZKAP, which has minimal time costs, is developed in the article. A scheme for adapting protocol parameters has been developed in this protocol to increase its efficiency. Reductions in the level of confidentiality allow us to reduce the time spent on the execution of the authentication protocol. This increases the volume of information traffic. At the same time, an increase in the confidentiality of the protocol entails an increase in the time needed for authentication of the prover, which reduces the volume of information traffic. The FPGA Artix-7 xc7a12ticsg325-1L was used to estimate the time spent implementing the adaptive ZKAP protocol. Testing was performed for 32- and 64-bit adaptive authentication protocols.
Search algorithm - Wikipedia
Algorithm - Wikipedia
Free Algorithms Book
Centrum Wiskunde & Informatica: Local improvement algorithms for a
Large Scale Text Search Algorithm with Tries: A Tutorial
Deriving objectively-measured sedentary indices from free-living
Learn Classification and Types of Machine Learning Algorithms
A review on reinforcement learning for contact-rich robotic
Missing Letters, Intermediate Algorithm Scripting
Recomendado para você
-
Codes, Project New world Wiki17 junho 2024
-
Project New World Codes – Gamezebo17 junho 2024
-
All The Races In Roblox Project New World, Ranked17 junho 2024
-
Machine Learning Engineer Salary-The Ultimate Guide for 202317 junho 2024
-
JPM, Free Full-Text17 junho 2024
-
News/Media Archive - Skender17 junho 2024
-
Purkinje cell dopaminergic inputs to astrocytes regulate cerebellar-dependent behavior17 junho 2024
-
Project New World codes (December 2022) - Free EXP boosts and more17 junho 2024
-
ALL NEW *SECRET* CODES in PROJECT NEW WORLD CODES! (Roblox Project New World Codes)17 junho 2024
-
ALL NEW *SECRET* XMAS UPDATE CODES in PROJECT NEW WORLD CODES! (Roblox Project New World Codes)17 junho 2024
você pode gostar
-
Made in Abyss Chapter 048, Made in Abyss Wiki17 junho 2024
-
Pokemon utlra super sunky17 junho 2024
-
Assistir Tondemo Skill de Isekai Hourou Meshi Dublado Todos os17 junho 2024
-
Slime – Minecraft Wiki17 junho 2024
-
Road to Ninja Haruno Sakura, Snazzyfluff Wiki17 junho 2024
-
Netflix Developing 'Horizon Zero Dawn' Series Based On Video Game17 junho 2024
-
Table Tennis World Tour - Play Online on SilverGames 🕹️17 junho 2024
-
How to See Your Stats on Spotify (2023 Guide)17 junho 2024
-
CANTANDO A PRÓPRIA HISTÓRIA - música de são paulo17 junho 2024
-
New Dragon Ball Z: Budokai Tenkaichi Game Announced - MP1st17 junho 2024