Results 101 to 110 of about 7,441 (248)
ABSTRACT Growing financial needs for a sustainable transition have led to the development of green finance and citizen‐led monetary innovations. These initiatives recognized the necessity of developing new forms of money regarding the environmental crisis, referred to as environmental complementary currency (ECCs).
Léo Revelli
wiley +1 more source
The Internet of Things (IoT) is a broad area that encompasses various use cases. Numerous use cases include various IoT devices, which necessitate various cryptographic methods to provide distinct security requirements.
Isil Cetintav, Mehmet Tahir Sandikkaya
doaj +1 more source
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
This research introduces a novel hybrid cryptographic framework that combines traditional cryptographic protocols with advanced methodologies, specifically Wasserstein Generative Adversarial Networks with Gradient Penalty (WGAN-GP) and Genetic Algorithms
Purushottam Singh +2 more
doaj +1 more source
Enhancing the SRAM PUF with an XOR Gate
This study focuses on designing enhanced Physically Unclonable Functions (PUFs) based on SRAM devices and improving the security of cryptographic systems.
Jack Garrard +2 more
doaj +1 more source
The article is a brief survey of hardware vulnerability analysis methods that might be applicable against cryptographic algorithm implementations. Those methods are based on physical properties of a device processing the algorithm.
Roman Gevorkovich Korkikian +2 more
doaj
A critical component of cybersecurity protection in the internet of vehicles (IoV) was identity authentication. However, many existing authentication schemes were plagued by low efficiency and incompatibility with domestic cryptographic algorithms.
SU Binting, FANG He, XU Li
doaj
Security Mechanisms and Access Control Infrastructure for Biometrics Passport using Cryptographic Protocols [PDF]
Vineet Kumar +1 more
openalex +1 more source

