Results 41 to 46 of about 579 (46)

Enhancing the SRAM PUF with an XOR Gate

open access: yesApplied Sciences
This study focuses on designing enhanced Physically Unclonable Functions (PUFs) based on SRAM devices and improving the security of cryptographic systems.
Jack Garrard   +2 more
doaj   +1 more source

Desktop application for crypto-protected voice communication

open access: yesVojnotehnički Glasnik
Introduction/purpose: All data exchanged over the Internet as well as other computer networks should be considered exposed to various types of security threats.
Stefan M. Ivanović   +4 more
doaj   +1 more source

Enhancing security in IIoT: RFID authentication protocol for edge computing and blockchain-enabled supply chain

open access: yesCyber Security and Applications
This paper addresses security challenges, especially in the authentication mechanism of Industrial Internet of Things (IIoT)-enabled supply chain systems by proposing an enhanced Radio Frequency Identification (RFID) authentication protocol.
Vikash Kumar, Santosh Kumar Das
doaj  

VERIFICATION OF KEY MANAGEMENT CRYPTOGRAPHIC PROTOCOLS WITH COLORED PETRI NETS

open access: yesВестник Донского государственного технического университета, 2018
The possibility of using colored Petri nets for the analysis of key distribution cryptographic protocols as an example of symmetric Needham—Schroeder protocol is reviewed and evaluated.
Nadezhda S. Mogilevskaya   +1 more
doaj  

vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms

open access: yesБезопасность информационных технологий, 2014
The article is a brief survey of hardware vulnerability analysis methods that might be applicable against cryptographic algorithm implementations. Those methods are based on physical properties of a device processing the algorithm.
Roman Gevorkovich Korkikian   +2 more
doaj  

Lightweight PUF-based anonymous authentication protocol in V2G

open access: yesTongxin xuebao
To address the issues of incomplete functionality, high communication overhead, and high computational cost in existing vehicle-to-grid (V2G) network authentication protocols, a lightweight anonymous authentication protocol based on physical unclonable ...
FAN Xinyue, LIU Jie, HE Jiahui
doaj  

Home - About - Disclaimer - Privacy