Algorithms, Free Full-Text
Por um escritor misterioso
Last updated 29 março 2025

Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Internet of Things, intelligent transportation systems (ITS), Vehicular Ad Hoc Network (VANET). This is due to the fact that authentication protocols effectively resist a number of attacks on wireless data transmission channels in these systems. The main disadvantage of most authentication protocols is the use of symmetric and asymmetric encryption systems to ensure high cryptographic strength. As a result, there is a problem in delivering keys to the sides of the prover and the verifier. At the same time, compromising of keys will lead to a decrease in the level of protection of the transmitted data. Zero-knowledge authentication protocols (ZKAP) are able to eliminate this disadvantage. However, most of these protocols use multiple rounds to authenticate the prover. Therefore, ZKAP, which has minimal time costs, is developed in the article. A scheme for adapting protocol parameters has been developed in this protocol to increase its efficiency. Reductions in the level of confidentiality allow us to reduce the time spent on the execution of the authentication protocol. This increases the volume of information traffic. At the same time, an increase in the confidentiality of the protocol entails an increase in the time needed for authentication of the prover, which reduces the volume of information traffic. The FPGA Artix-7 xc7a12ticsg325-1L was used to estimate the time spent implementing the adaptive ZKAP protocol. Testing was performed for 32- and 64-bit adaptive authentication protocols.

Learn About Algorithms and Data Structures in this Free 6-hour Course

Algorithm for optimized mRNA design improves stability and

Genetic Algorithms And Investment Strategies Download - Colaboratory

Search algorithm - Wikipedia

Word cloud algorithm Royalty Free Vector Image

Text Algorithms - Free Computer, Programming, Mathematics

The Algorithms Illuminated Book Series
Algorithms : Free Download, Borrow, and Streaming : Internet Archive

Free Course: Data Structure and Algorithms in JAVA from Great

Top text generation algorithms how they work - FasterCapital

Free Algorithms Book

Validation of automatic wear-time detection algorithms in a free

Common pitfalls and recommendations for using machine learning to
Algo-rythmics

What is A* Search Algorithm? A* (star) Algorithm in AI 2024
Recomendado para você
-
All The Races In Roblox Project New World, Ranked29 março 2025
-
What Dev fruit code?! New Sea beast.. ROBLOX Project New World Codes !29 março 2025
-
10 Best Free C Programming Courses to Take in 2023 — Class Central29 março 2025
-
Green Infrastructure Codes and Ordinances29 março 2025
-
Will Rogers World Airport - Wikipedia29 março 2025
-
JPM, Free Full-Text29 março 2025
-
MiPCT Webinar 04/18/201229 março 2025
-
Top 10 Trending Metaverse Projects of The Week - NFT News Pro29 março 2025
-
HCB Magazine May 2019 by Chemical Watch - Issuu29 março 2025
-
Saticoy & Wells Community Plan & Development - City Of Ventura29 março 2025
você pode gostar
-
Darkness-anime GIFs - Find & Share on GIPHY29 março 2025
-
Códigos para Murder Mystery 2 no Roblox – Outubro de 202329 março 2025
-
꒰🍒꒱ @𝘤𝘩𝘹𝘳𝘳𝘺𝘭𝘤𝘷𝘦29 março 2025
-
Stranger Things Season 4 Volume 2: Who Will Die?29 março 2025
-
Chimia de figo - 740g29 março 2025
-
JoJo's Bizarre Adventure - Rudol von Stroheim Statue Legend Figure29 março 2025
-
Download do APK de Assistir Boruto para Android29 março 2025
-
Hamster Care Sheet: Food, Habitat & Health29 março 2025
-
BOJJI & KAGE Hard Enamel Pins Fanart From Ranking of Kings - Finland29 março 2025
-
Understanding Halo: The Master Chief Collection (FAQ) -- playlists, Forge, control schemes, and more29 março 2025