Results 101 to 110 of about 9,006 (193)
FlexAEAD v1.1 -A Lightweight AEAD Cipher with Integrated Authentication
This paperdescribes a symmetrical block cipher family – FlexAEAD v1.1. This is an updated version of the work presented as round 1 candidate on the contest for NIST lightweight crypto standardization process. It was engineered to be lightweight, consuming less computational resources than other ciphers and to work with different block and key sizes ...
Eduardo Marsola do Nascimento +1 more
openaire +1 more source
The ultrasonic polishing process makes use of the high-frequency (ultrasonic) vibrations of an abradable tool which automatically conforms to the work piece and an abrasive slurry to finish surfaces and edges on complex, highly detailed, close tolerance ...
Gilmore, Randy
core +1 more source
Rule Based System for Diagnosing Wireless Connection Problems Using SL5 Object [PDF]
There is an increase in the use of in-door wireless networking solutions via Wi-Fi and this increase infiltrated and utilized Wi-Fi enable devices, as well as smart mobiles, games consoles, security systems, tablet PCs and smart TVs.
Abu Naser, Samy S. +2 more
core
Rough analysis in lattices. [PDF]
An outline of an algebraie generalization of the rough set theory is presented in the paper. It is shown that the majority of the basic concepts of this theory has an immediate algebraic generalization, and that some rough set facts are true in general ...
Iwinski, Tadeusz B.
core
Knowledge-based systems that determine the appropriate students major: In the faculty of engineering and information technology [PDF]
In this paper a Knowledge-Based System (KBS) for determining the appropriate students major according to his/her preferences for sophomore student enrolled in the Faculty of Engineering and Information Technology in Al-Azhar University of Gaza was ...
Naser, Samy S. Abu, Zaqout, Ihab S.
core
Spartan Daily, May 15, 1947 [PDF]
Volume 35, Issue 136https://scholarworks.sjsu.edu/spartandaily/9001/thumbnail ...
San Jose State University, School of Journalism and Mass Communications
core +1 more source
The Internet of Things (IoT) refers to the latest iteration of the Internet, enabling communication and interaction among interconnected items. It is thriving and permeating every aspect of our life, including school, home, automobiles, and healthcare ...
Lei Song +4 more
doaj +1 more source
SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security
We present \(\mathsf {SpookChain}\), a new online authenticated encryption (OAE) mode that offers several appealing features: \(\mathsf {SpookChain}\) is fully online: it supports the processing of long messages by segments of arbitrary size, and the processing of each segment is online itself, with memory requirements in encryption and decryption
Cassiers, Gaëtan +5 more
openaire +2 more sources
Cloud data lakes accumulate massive volumes of append-only, high-frequency logs from web servers, gateways, security appliances, and databases. Ensuring their integrity is challenging because existing blockchain-assisted auditing schemes are primarily ...
Vayuphak Saengthong +4 more
doaj +1 more source
LACP-SG: Lightweight Authentication Protocol for Smart Grids. [PDF]
Tanveer M, Alasmary H.
europepmc +1 more source

