5   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Francisco Alonso, Benjamín Samaniego, Gonzalo Farias and Sebastián Dormido-Canto    
This article provides a general overview of the communication protocols used in the IEC61850 standard for the automation of electrical substations. Specifically, it examines the GOOSE and R-GOOSE protocols, which are used for exchanging various types of ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Liliya Akhmetzyanova     Pág. 1 - 9
In this paper the security of AEAD mode called the Multilinear Galois Mode (MGM) was analyzed regarding confidentiality property. This mode was originally proposed in CTCrypt 2017. Then it was adopted as a standard AEAD mode in the Ru... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Yidong Xu, Shengping Zhao, Wenjing Shang, Peisong Jia, Jincheng Gao, Vladimir Korochentsev and Vladimir Grischenko    
Electric anomaly detection (EAD) has been widely used for target detection in underwater areas. However, due to the high path loss in the water, an electric anomaly is usually submerged in environmental noise and interference, which affects the detection... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Liliya Akhmetzyanova,Evgeny Alekseev,Alexandra Babueva,Andrey Bozhko,Stanislav Smyshlyaev     Pág. 6 - 14
We introduce a new AEAD mode ? an MGM2 mode. For this mode we provide security bounds regarding extended security notions in the nonce-misuse setting. Misuseresistance is crucial for applications for which there is no way to provide u... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Liliya Akhmetzyanova,Evgeny Alekseev,Alexandra Babueva,Andrey Bozhko,Stanislav Smyshlyaev     Pág. 6 - 14
We introduce a new AEAD mode ? an MGM2 mode. For this mode we provide security bounds regarding extended security notions in the nonce-misuse setting. Misuseresistance is crucial for applications for which there is no way to provide u... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »