Results 31 to 40 of about 313,696 (165)

Fly-By-Wireless for Next Generation Aircraft: Challenges and Potential solutions [PDF]

open access: yes, 2012
”Fly-By-Wireless” paradigm based on wireless connectivity in aircraft has the potential to improve efficiency and flexibility, while reducing weight, fuel consumption and maintenance costs.
Dang, Dinh Khanh   +2 more
core   +2 more sources

AES-CBC Software Execution Optimization

open access: yes, 2012
With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process.
Doma, Jayramsingh   +2 more
core   +1 more source

Link-layer Security in TSCH Networks: Effect on Slot Duration [PDF]

open access: yes, 2016
International audienceThe IEEE802.15.4e-2012 standard is widely used in multi-hop wireless Industrial Internet of Things (IIoT)applications. In the Time-Slotted Channel Hopping (TSCH) mode, nodes are synchronized, and time iscut into timeslots.
Dujovne   +14 more
core   +4 more sources

A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Network

open access: yes, 2011
A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment.
Akyildiz   +14 more
core   +2 more sources

A MAC Mode for Lightweight Block Ciphers [PDF]

open access: yes, 2016
status ...
A Baysal   +35 more
core   +3 more sources

Securing Internet of Things with Lightweight IPsec [PDF]

open access: yes, 2010
Real-world deployments of wireless sensor networks (WSNs) require secure communication. It is important that a receiver is able to verify that sensor data was generated by trusted nodes. In some cases it may also be necessary to encrypt sensor data in
Chung, Tony   +5 more
core   +1 more source

Forensic analysis and evaluation of file‐wiping applications in Android OS

open access: yesJournal of Forensic Sciences, EarlyView.
Abstract Anti‐forensics refers to techniques designed to obstruct the discovery of evidence in digital forensic investigations. File‐wiping is one of the anti‐forensic techniques that make data recovery impossible by overwriting data with specific patterns. This technique poses significant challenges to investigators.
Dong Bin Oh   +6 more
wiley   +1 more source

Chaining & counter-based block cipher mode for authentication

open access: yesTongxin xuebao, 2009
For raising the operation efficiency of block cipher algorithms,a fast authentication mode based on chaining & counter(CCTR) was put forward;and its security was proved.Its speed was about 30% faster than that of authentication modes in common use(for ...
HUANG Yu-hua1   +2 more
doaj   +2 more sources

Point‐Of‐Care Respiratory Diagnosis and Antibiotic Utilization in the Emergency Department: A Prospective Evaluation of Multiplex PCR

open access: yesAcademic Emergency Medicine, EarlyView.
ABSTRACT Objectives Rapid multiplex point‐of‐care (POC) PCR tests may reduce unnecessary antibiotic prescribing by quickly identifying viral etiologies in patients with acute respiratory infections (ARI). We evaluated the impact of a rapid (~15 min) multiplex PCR test on antibiotic prescribing, provider confidence, patient satisfaction, and emergency ...
Andrew C. Meltzer   +11 more
wiley   +1 more source

Using Simon's Algorithm to Attack Symmetric-Key Cryptographic Primitives [PDF]

open access: yes, 2017
We present new connections between quantum information and the field of classical cryptography. In particular, we provide examples where Simon's algorithm can be used to show insecurity of commonly used cryptographic symmetric-key primitives ...
Santoli, Thomas, Schaffner, Christian
core   +1 more source

Home - About - Disclaimer - Privacy