Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    REVIEW

    Review of Communication Protocols and Cryptographic Techniques Applied in Secure Token Transmission

    Michael Juma Ayuma1,*, Shem Mbandu Angolo1, Philemon Nthenge Kasyoka2, Simon Maina Karume3

    Journal of Cyber Security, Vol.7, pp. 307-341, 2025, DOI:10.32604/jcs.2025.067360 - 02 September 2025

    Abstract Token transmission is a fundamental component in diverse domains, including computer networks, blockchain systems, distributed architectures, financial transactions, secure communications, and identity verification. Ensuring optimal performance during transmission is essential for maintaining the efficiency of data in transit. However, persistent threats from adversarial actors continue to pose significant risks to the integrity, authenticity, and confidentiality of transmitted data. This study presents a comprehensive review of existing research on token transmission techniques, examining the roles of transmission channels, emerging trends, and the associated security and performance implications. A critical analysis is conducted to assess the strengths, More >

  • Open Access

    ARTICLE

    Robust Authentication and Session Key Agreement Protocol for Satellite Communications

    Somayeh Soltani1, Seyed Amin Hosseini Seno1, Juli Rejito2, Rahmat Budiarto3,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5891-5910, 2022, DOI:10.32604/cmc.2022.023697 - 14 January 2022

    Abstract Satellite networks are recognized as the most essential communication infrastructures in the world today, which complement land networks and provide valuable services for their users. Extensive coverage and service stability of these networks have increased their popularity. Since eavesdropping and active intrusion in satellite communications are much easier than in terrestrial networks, securing satellite communications is vital. So far, several protocols have been proposed for authentication and key exchange of satellite communications, but none of them fully meet the security requirements. In this paper, we examine one of these protocols and identify its security vulnerabilities.… More >

Displaying 1-10 on page 1 of 2. Per Page