28   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Fabian Honecker, Julian Dreyer and Ralf Tönjes    
Modern Public Key Infrastructures (PKIs) allow users to create and maintain centrally stored cryptographic certificates. These infrastructures use a so-called certificate chain. At the root of the chain, a root Certification Authority (CA) is responsible... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Bertrand Cambou, Michael Gowanlock, Bahattin Yildiz, Dina Ghanaimiandoab, Kaitlyn Lee, Stefan Nelson, Christopher Philabaum, Alyssa Stenberg and Jordan Wright    
Using physical unclonable functions (PUFs), in support of networks secured with a public key infrastructure, to generate, on demand, the key pairs needed for lattice and code PQC algorithms.
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Hwajeong Seo    
In this paper, we present scalable multi-precision multiplication implementation and scalable multi-precision squaring implementation for 32-bit ARM Cortex-M4 microcontrollers. For efficient computation and scalable functionality, we present optimized Mu... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Han-Yu Lin    
Nowadays there are many social networking services supporting three-party communication such as Skype, Line, and Facebook Messenger. To ensure the message security, a cryptographic encryption scheme is a commonly adopted measure. However, the traditional... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yuan Ping, Baocang Wang, Shengli Tian, Jingxian Zhou and Hui Ma    
By introducing an easy knapsack-type problem, a probabilistic knapsack-type public key cryptosystem (PKCHD) is proposed. It uses a Chinese remainder theorem to disguise the easy knapsack sequence. Thence, to recover the trapdoor information, the implicit... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jyotirmoy Das,Sangeeta Kakoty,Majidul Ahmed     Pág. 70 - 76
The access to digital data by the users has increased in recent times with the advent of data communication technologies and its popularization. The data which is in digital form has to pass through insecure channels, for example when a user accesses the... ver más
Revista: IRA-International Journal of Technology & Engineering    Formato: Electrónico

 
en línea
Hugo Solís-Sánchez and E. Gabriela Barrantes    
-
Revista: Information    Formato: Electrónico

 
en línea
Oliver Hanka, Michael Eichhorn, Martin Pfannenstein, Jörg Eberspächer and Eckehard Steinbach    
Revista: Future Internet    Formato: Electrónico

 
en línea
Oliver Hanka, Michael Eichhorn, Martin Pfannenstein, Jörg Eberspächer and Eckehard Steinbach    
Revista: Future Internet    Formato: Electrónico

 
en línea
Yeongjae Park, Hyeondo Yoo, Jieun Ryu, Young-Rak Choi, Ju-Sung Kang and Yongjin Yeom    
Owing to the expansion of non-face-to-face activities, security issues in video conferencing systems are becoming more critical. In this paper, we focus on the end-to-end encryption (E2EE) function among the security services of video conferencing system... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Burhan Ul Islam Khan, Khang Wen Goh, Mohammad Shuaib Mir, Nur Fatin Liyana Mohd Rosely, Aabid Ahmad Mir and Mesith Chaimanee    
As the Internet of Things (IoT) continues to revolutionize value-added services, its conventional architecture exhibits persistent scalability and security vulnerabilities, jeopardizing the trustworthiness of IoT-based services. These architectural limit... ver más
Revista: Information    Formato: Electrónico

 
en línea
Haotian Liang, Guidong Zhang, Wenjin Hou, Pinyi Huang, Bo Liu and Shouliang Li    
Most of the image encryption schemes based on chaos have so far employed symmetric key cryptography, which leads to a situation where the key cannot be transmitted in public channels, thus limiting their extended application. Based on the elliptic curve ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jheng-Jia Huang, Yi-Fan Tseng, Qi-Liang Yang and Chun-I Fan    
Authentication has been adopted in many areas, but most of these authentication schemes are built using traditional cryptographic primitives. It is widely believed that such primitives are not resistant to quantum algorithms. To deal with those quantum a... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Qiang Li    
Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication tr... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ignazio Pedone and Antonio Lioy    
Quantum Key Distribution (QKD) represents a reasonable countermeasure to the advent of Quantum Computing and its impact on current public-key cryptography. So far, considerable efforts have been devoted to investigate possible application scenarios for Q... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Despoina Chochtoula, Aristidis Ilias, Yannis C. Stamatiou and Christos Makris    
SCADA systems monitor critical industrial, energy and other physical infrastructures in order to detect malfunctions, issue alerts and, in many cases, propose or even take remedial actions. However, due to their attachment to the Internet, SCADA systems ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Anish Saini, Athanasios Tsokanos and Raimund Kirner    
Cryptography is the study and practice of secure communication with digital data and focuses on confidentiality, integrity, and authentication. Random number generators (RNGs) generate random numbers to enhance security. Even though the cryptographic alg... ver más
Revista: Information    Formato: Electrónico

 
en línea
Athanasios Goudosis and Sokratis Katsikas    
The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents. Unfortunately, people involved in such i... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
ByeongGyu Park, Suhri Kim, Seokhie Hong, HeeSeok Kim and Seog Chung Seo    
Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC). To date, the algebraic security of certain variants of McEliece cryptosystems ha... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Hongbin Yang, Shuxiong Jiang, Wenfeng Shen and Zhou Lei    
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data. However, most of the existing PDP schemes are based on either public key infrastruc... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »