22   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Asher Sajid, Omar S. Sonbul, Muhammad Rashid and Muhammad Yousuf Irfan Zia    
The focus of this article is to present a novel crypto-accelerator architecture for a resource-constrained embedded system that utilizes elliptic curve cryptography (ECC). The architecture is built around Binary Edwards curves (BEC) to provide resistance... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Shunfang Hu, Shaoping Jiang, Qing Miao, Fan Yang, Weihong Zhou and Peng Duan    
With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting user privacy have become increasingly challenging. End devices in the IoT are often deployed in unattended environments and connected to open networks, making ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Nasour Bagheri, Ygal Bendavid, Masoumeh Safkhani and Samad Rostampour    
A smart grid is an electricity network that uses advanced technologies to facilitate the exchange of information and electricity between utility companies and customers. Although most of the technologies involved in such grids have reached maturity, smar... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Oluwakemi Christiana Abikoye, Esau Taiwo Oladipupo, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, Cheng-Chi Lee and Chun-Ta Li    
The application of the Internet of Medical Things (IoMT) in medical systems has brought much ease in discharging healthcare services by medical practitioners. However, the security and privacy preservation of critical user data remain the reason the tech... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Despoina Chochtoula, Aristidis Ilias, Yannis C. Stamatiou and Christos Makris    
SCADA systems monitor critical industrial, energy and other physical infrastructures in order to detect malfunctions, issue alerts and, in many cases, propose or even take remedial actions. However, due to their attachment to the Internet, SCADA systems ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Haotian Liang, Guidong Zhang, Wenjin Hou, Pinyi Huang, Bo Liu and Shouliang Li    
Most of the image encryption schemes based on chaos have so far employed symmetric key cryptography, which leads to a situation where the key cannot be transmitted in public channels, thus limiting their extended application. Based on the elliptic curve ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Bikash Poudel, Arslan Munir, Joonho Kong and Muazzam A. Khan    
The elliptic curve cryptosystem (ECC) has been proven to be vulnerable to non-invasive side-channel analysis attacks, such as timing, power, visible light, electromagnetic emanation, and acoustic analysis attacks. In ECC, the scalar multiplication compon... ver más
Revista: Journal of Low Power Electronics and Applications    Formato: Electrónico

 
en línea
Anuj Kumar Singh, Arun Solanki, Anand Nayyar and Basit Qureshi    
In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Adeel Abro, Zhongliang Deng and Kamran Ali Memon    
Device-to-Device (D2D) is a major part of 5G that will facilitate deployments with extended coverage where devices can act as users or relays. These relays normally act as decode and forward relays (semi-intelligent devices) with limited computational an... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Zhibin Zhou, Pin Liu, Qin Liu and Guojun Wang    
As more and more items are tagged with RFID (Radio Frequency Identification) tags, grouping-proof technology is widely utilized to provide a coexistence evidence for a group of related items. Due to the wireless channel used in RFID systems, a security r... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Zhibin Zhou, Pin Liu, Qin Liu and Guojun Wang    
As more and more items are tagged with RFID (Radio Frequency Identification) tags, grouping-proof technology is widely utilized to provide a coexistence evidence for a group of related items. Due to the wireless channel used in RFID systems, a security r... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mohamad Ali Mehrabi and Christophe Doche    
Twisted Edwards curves have been at the center of attention since their introduction by Bernstein et al. in 2007. The curve ED25519, used for Edwards-curve Digital Signature Algorithm (EdDSA), provides faster digital signatures than existing schemes with... ver más
Revista: Information    Formato: Electrónico

 
en línea
Javier Omar Contreras Rodriguez, Reinaldo Nicolás Mayol Arnao     Pág. 41 - 53
En la actualidad, el auge de las aplicaciones de las redes de sensores inalámbricos (WSN = Wireless Sensors Networks) está generando una gran cantidad de información de carácter sensible que requiere un manejo confiable mediante la implementación de sist... ver más
Revista: IngenierÍ­a al DÍ­a    Formato: Electrónico

 
en línea
Hasan Hashim, Ahmad Reda Alzighaibi, Amaal Farag Elessawy, Ibrahim Gad, Hatem Abdul-Kader and Asmaa Elsaid    
A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending atta... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Muhammad Asghar Khan, Hosam Alhakami, Insaf Ullah, Wajdi Alhakami, Syed Agha Hassnain Mohsan, Usman Tariq and Nisreen Innab    
Security and privacy issues were long a subject of concern with drones from the past few years. This is due to the lack of security and privacy considerations in the design of the drone, which includes unsecured wireless channels and insufficient computi... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Shuo Zhang, Yaping Liu, Zhiyu Han and Zhikai Yang    
With the rapid development of unmanned aerial vehicles (UAVs), often referred to as drones, their security issues are attracting more and more attention. Due to open-access communication environments, UAVs may raise security concerns, including authentic... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Mauro Tropea, Mattia Giovanni Spina, Floriano De Rango and Antonio Francesco Gentile    
Wireless Sensor Networks (WSNs) are networks of small devices with limited resources which are able to collect different information for a variety of purposes. Energy and security play a key role in these networks and MAC aspects are fundamental in their... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Hwajeong Seo    
In this paper, we present scalable multi-precision multiplication implementation and scalable multi-precision squaring implementation for 32-bit ARM Cortex-M4 microcontrollers. For efficient computation and scalable functionality, we present optimized Mu... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Rajesh Natarajan, Gururaj Harinahallo Lokesh, Francesco Flammini, Anitha Premkumar, Vinoth Kumar Venkatesan and Shashi Kant Gupta    
Background: The Internet of Medical Things, often known as IoMT, is a revolutionary method of connecting medical equipment and the software that operates on it to the computer networks that are used in healthcare 5.0. The rapid development of smart medic... ver más
Revista: Infrastructures    Formato: Electrónico

 
en línea
Ali Takieldeen, Said H. Abd Elkhalik, Ahmed S. Samra, Mohamed A. Mohamed and Fahmi Khalifa    
With the progressive development of a wide range of applications, interconnect things and internet of things (IoT) became an imperative required trend by industries and academicians. IoT became a base infrastructure for remote access or control depending... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »