12   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Mohamad Ali Mehrabi and Christophe Doche    
Twisted Edwards curves have been at the center of attention since their introduction by Bernstein et al. in 2007. The curve ED25519, used for Edwards-curve Digital Signature Algorithm (EdDSA), provides faster digital signatures than existing schemes with... ver más
Revista: Information    Formato: Electrónico

 
en línea
Javier Omar Contreras Rodriguez, Reinaldo Nicolás Mayol Arnao     Pág. 41 - 53
En la actualidad, el auge de las aplicaciones de las redes de sensores inalámbricos (WSN = Wireless Sensors Networks) está generando una gran cantidad de información de carácter sensible que requiere un manejo confiable mediante la implementación de sist... ver más
Revista: IngenierÍ­a al DÍ­a    Formato: Electrónico

 
en línea
Nasour Bagheri, Ygal Bendavid, Masoumeh Safkhani and Samad Rostampour    
A smart grid is an electricity network that uses advanced technologies to facilitate the exchange of information and electricity between utility companies and customers. Although most of the technologies involved in such grids have reached maturity, smar... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Muhammad Asghar Khan, Hosam Alhakami, Insaf Ullah, Wajdi Alhakami, Syed Agha Hassnain Mohsan, Usman Tariq and Nisreen Innab    
Security and privacy issues were long a subject of concern with drones from the past few years. This is due to the lack of security and privacy considerations in the design of the drone, which includes unsecured wireless channels and insufficient computi... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Shuo Zhang, Yaping Liu, Zhiyu Han and Zhikai Yang    
With the rapid development of unmanned aerial vehicles (UAVs), often referred to as drones, their security issues are attracting more and more attention. Due to open-access communication environments, UAVs may raise security concerns, including authentic... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Haotian Liang, Guidong Zhang, Wenjin Hou, Pinyi Huang, Bo Liu and Shouliang Li    
Most of the image encryption schemes based on chaos have so far employed symmetric key cryptography, which leads to a situation where the key cannot be transmitted in public channels, thus limiting their extended application. Based on the elliptic curve ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Hwajeong Seo    
In this paper, we present scalable multi-precision multiplication implementation and scalable multi-precision squaring implementation for 32-bit ARM Cortex-M4 microcontrollers. For efficient computation and scalable functionality, we present optimized Mu... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Rajesh Natarajan, Gururaj Harinahallo Lokesh, Francesco Flammini, Anitha Premkumar, Vinoth Kumar Venkatesan and Shashi Kant Gupta    
Background: The Internet of Medical Things, often known as IoMT, is a revolutionary method of connecting medical equipment and the software that operates on it to the computer networks that are used in healthcare 5.0. The rapid development of smart medic... ver más
Revista: Infrastructures    Formato: Electrónico

 
en línea
Ali Takieldeen, Said H. Abd Elkhalik, Ahmed S. Samra, Mohamed A. Mohamed and Fahmi Khalifa    
With the progressive development of a wide range of applications, interconnect things and internet of things (IoT) became an imperative required trend by industries and academicians. IoT became a base infrastructure for remote access or control depending... ver más
Revista: Information    Formato: Electrónico

 
en línea
Régis Leveugle, Asma Mkhinini and Paolo Maistri    
In the Internet of Things (IoT), many strong constraints have to be considered when designing the connected objects, including low cost and low power, thus limited resources. The confidentiality and integrity of sensitive data must however be ensured eve... ver más
Revista: Information    Formato: Electrónico

 
en línea
Rohit Kumar Das, Sanjeet Kumar Nayak, Sourav Kumar Bhoi, Suman Kumar Choudhury, Banshidhar Majhi and Sujata Mohanty    
Due to an increase in the number of internet users, electronic commerce has grown significantly during the last decade. Electronic auction (e-auction) is one of the famous e-commerce applications. Even so, security and robustness of e-auction schemes sti... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Asher Sajid, Omar S. Sonbul, Muhammad Rashid and Muhammad Yousuf Irfan Zia    
The focus of this article is to present a novel crypto-accelerator architecture for a resource-constrained embedded system that utilizes elliptic curve cryptography (ECC). The architecture is built around Binary Edwards curves (BEC) to provide resistance... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »