20   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Chih-Hsueh Lin, Guo-Hsin Hu, Che-Yu Chan and Jun-Juh Yan    
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Manal Rajeh AlShalaan and Suliman Mohamed Fati    
To address a business need, most organizations allow employees to use their own devices to enhance productivity and job satisfaction. For this purpose, the Bring Your Own Device (BYOD) policy provides controllable access for employees to organize data th... ver más
Revista: Information    Formato: Electrónico

 
en línea
Saleem S. Hameedi and Oguz Bayat    
Over the past few years, the Internet of Things (IoT) is one of the most significant technologies ever used, as everything is connected to the Internet. Integrating IoT technologies with the cloud improves the performance, activity, and innovation of suc... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Puji Sari Ramadhan,Muhammad Syahril,Rini Kustini,Hendryan Winata,Robin Darwis Gea     Pág. 60 - 70
This study discusses the effectiveness of using AES (Advanced Encryption Standard) and RC4 (Rivest Chipper 4) as digital data security algorithms to prevent and protect transaction data from irresponsible parties. This needs to be done because the develo... ver más

 
en línea
Tiago Gomes, Pedro Sousa, Miguel Silva, Mongkol Ekpanyapong and Sandro Pinto    
In the new Internet of Things (IoT) era, embedded Field-Programmable Gate Array (FPGA) technology is enabling the deployment of custom-tailored embedded IoT solutions for handling different application requirements and workloads. Combined with the open R... ver más
Revista: Journal of Low Power Electronics and Applications    Formato: Electrónico

 
en línea
Jean Raphael Ngnie Sighom, Pin Zhang and Lin You    
In today?s society, cloud computing has significantly impacted nearly every section of our lives and business structures. Cloud computing is, without any doubt, one of the strategic directions for many companies and the most dominating infrastructure for... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Samsul Huda, Amang Sudarsono, Tri Harsono     Pág. 115 - 140
MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Agus Winarno and Riri Fitri Sari    
Personal data security is a cybersecurity trend that has captured the world?s attention. Governments, practitioners and academics are jointly building personal data security in various communication systems, including IoT. The protocol that is widely use... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Samira Briongos, Pedro Malagón, Juan-Mariano de Goyeneche and Jose M. Moya    
This work introduces a new approach to exploit the information gained from cache attacks. Contrary to previous approaches, we focus on cache misses to retrieve the secret AES encryption key more advantageously: we target the OpenSSL AES T-table-based imp... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mokhtar Ouamri,Kamel M. Faraoun     Pág. 221 - 229
Emerging High efficiency video coding (HEVC) is expected to be widely adopted in network applications for high definition devices and mobile terminals. Thus, construction of HEVC's encryption schemes that maintain format compliance and bit rate of encryp... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Valentin Martinoli, Elouan Tourneur, Yannick Teglia and Régis Leveugle    
In this work, we study an end-to-end implementation of a Prime + Probe covert channel on the CVA6 RISC-V processor implemented on a FPGA target and running a Linux OS. We develop the building blocks of the covert channel and provide a detailed view of it... ver más
Revista: Journal of Low Power Electronics and Applications    Formato: Electrónico

 
en línea
Yongbo Jiang, Gongxue Sun and Tao Feng    
With the increasing value of various kinds of data in the era of big data, the demand of different subjects for data transactions has become more and more urgent. In this paper, a blockchain-based data transaction protection scheme is proposed to realize... ver más
Revista: Information    Formato: Electrónico

 
en línea
Febby Ronaldo, Amang Sudarsono, Dadet Pramadihanto     Pág. 120 - 135
Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time.  Howe... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Febby Ronaldo, Amang Sudarsono, Dadet Pramadihanto     Pág. 120 - 135
Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time.  Howe... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Malik Qasaimeh, Raad S. Al-Qassas and Mohammad Ababneh    
IoT devices include RFID tags, microprocessors, sensors, readers, and actuators. Their main characteristics are their limited resources and computing capabilities, which pose critical challenges to the reliability and security of their applications. Encr... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mohammad Nasim Imtiaz Khan, Shivam Bhasin, Bo Liu, Alex Yuan, Anupam Chattopadhyay and Swaroop Ghosh    
Emerging Non-Volatile Memories (NVMs) such as Magnetic RAM (MRAM), Spin-Transfer Torque RAM (STTRAM), Phase Change Memory (PCM) and Resistive RAM (RRAM) are very promising due to their low (static) power operation, high scalability and high performance. ... ver más
Revista: Journal of Low Power Electronics and Applications    Formato: Electrónico

 
en línea
Erick Paulus, Mochamad Azmi Fauzan     Pág. 1 - 11
The technology development allows people to more easily communicate and convey information. The current communication media can facilitate its users to send and receive digital data, such as text, sound or digital image. But in terms of security, communi... ver más

 
en línea
Adi Widarma     Pág. 1 - 8
Abstrak ? Pengiriman atau pertukaran data adalah hal yang sering terjadi dalam dunia teknologi informasi. Data yang dikirim kadang sering berisi data informasi yang penting bahkan sangat rahasia dan harus dijaga keamanannya. Untuk menjaga keamanan data, ... ver más

 
en línea
Kiernan George and Alan J. Michaels    
This paper focuses on a block cipher adaptation of the Galois Extension Fields (GEF) combination technique for PRNGs and targets application in the Internet of Things (IoT) space, an area where the combination technique was concluded as a quality stream ... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Jin-Bo Wang, You Wu and Yu Zhou    
Maximum distance separable (MDS) codes have the maximum branch number in cryptography, and they are generally used in diffusion layers of symmetric ciphers. The diffusion layer of the Advanced Encryption Standard (AES) uses the circulant MDS matrix with ... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »