Results 21 to 30 of about 335,598 (166)

Mode Tracking of Unidirectional Carbon-Based Composite Structures Using Modified Mode Shape Vectors

open access: yesCrystals, 2022
A comparison of mode shapes in isotropic structures can be efficiently performed using the modal assurance criterion (MAC) to determine the similarity between mode shape vectors.
Chan-Jung Kim
doaj   +1 more source

Fast and Secure CBC-Type MAC Algorithms

open access: closedFast Software Encryption Workshop, 2009
M. Nandi
semanticscholar   +2 more sources

Predictive value of immature granulocyte in the diagnosis of acute complicated appendicitis.

open access: yesPLoS ONE, 2022
IntroductionThe goal in appendicitis is early diagnosis and early treatment. Complications develop as treatment is delayed. Therefore, there is a need for fast, low-cost markers that can be diagnosed earlier.
Gulsum Feyza Turkes   +2 more
doaj   +1 more source

On The Exact Security of Message Authentication Using Pseudorandom Functions

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Traditionally, modes of Message Authentication Codes(MAC) such as Cipher Block Chaining (CBC) are instantiated using block ciphers or keyed Pseudo Random Permutations(PRP). However, one can also use domain preserving keyed Pseudo Random Functions(PRF) to
Ashwin Jha, Avradip Mandal, Mridul Nandi
doaj   +1 more source

On Beyond-Birthday-Bound Security: Revisiting the Development of ISO/IEC 9797-1 MACs

open access: yesIACR Transactions on Symmetric Cryptology, 2019
ISO/IEC 9797-1 is an international standard for block-cipher-based Message Authentication Code (MAC). The current version ISO/IEC 9797-1:2011 specifies six single-pass CBC-like MAC structures that are capped at the birthday bound security.
Yaobin Shen, Lei Wang
doaj   +1 more source

SOFIA : software and control flow integrity architecture [PDF]

open access: yes, 2016
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities, as their failure can lead to injury, damage to equipment, or environmental catastrophe.
Coppens, Bart   +8 more
core   +1 more source

CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion

open access: yesCryptography, 2018
In some wireless environments, minimizing the size of messages is paramount due to the resulting significant energy savings. We present CMCC (CBC-MAC-CTR-CBC), an authenticated encryption scheme with associated data (AEAD) that is also nonce misuse ...
Jonathan Trostle
doaj   +1 more source

KALwEN: a new practical and interoperable key management scheme for body sensor networks [PDF]

open access: yes, 2010
Key management is the pillar of a security architecture. Body sensor networks (BSNs) pose several challenges–some inherited from wireless sensor networks (WSNs), some unique to themselves–that require a new key management scheme to be tailor-made.
Gong, Zheng   +4 more
core   +3 more sources

Options for Securing RTP Sessions [PDF]

open access: yes, 2014
The Real-time Transport Protocol (RTP) is used in a large number of different application domains and environments. This heterogeneity implies that different security mechanisms are needed to provide services such as confidentiality ...
Perkins, C., Westerlund, M.
core   +2 more sources

Power Consumption and Calculation Requirement Analysis of AES for WSN IoT

open access: yesSensors, 2018
Because of the ubiquity of Internet of Things (IoT) devices, the power consumption and security of IoT systems have become very important issues. Advanced Encryption Standard (AES) is a block cipher algorithm is commonly used in IoT devices.
Chung-Wen Hung, Wen-Ting Hsu
doaj   +1 more source

Home - About - Disclaimer - Privacy