Results 41 to 50 of about 2,626,008 (101)

Monografia [PDF]

open access: yesarXiv, 2012
Developed structural scheme implementation of an integrated security and formulated principles for the creation and development of an effective system of information security.
arxiv  

Secure management of logs in internet of things [PDF]

open access: yes, 2015
Ever since the advent of computing, managing data has been of extreme importance. With innumerable devices getting added to network infrastructure, there has been a proportionate increase in the data which needs to be stored.
Gupta, Udit
core  

Leveraging a Randomized Key Matrix to Enhance the Security of Symmetric Substitution Ciphers

open access: yes, 2023
An innovative strategy to enhance the security of symmetric substitution ciphers is presented, through the implementation of a randomized key matrix suitable for various file formats, including but not limited to binary and text files.
Dravid, Mihika   +6 more
core  

Ghosts of Deletions Past: New Secure Deletion Challenges and Solutions [PDF]

open access: yesarXiv, 2016
Is secure deletion of data still a problem?
arxiv  

Cryptographic Authentication of Navigation Protocols [PDF]

open access: yesarXiv, 2005
We examine the security of existing radio navigation protocols and attempt to define secure, scalable replacements.
arxiv  

A secure archive for Voice-over-IP conversations

open access: yes, 2006
An efficient archive securing the integrity of VoIP-based two-party conversations is presented. The solution is based on chains of hashes and continuously chained electronic signatures.
Hett, Christian   +2 more
core   +1 more source

Injecting Software Vulnerabilities with Voltage Glitching [PDF]

open access: yesarXiv, 2019
We show how voltage glitching can cause timing violations in CMOS behavior. Then we attack a real, security hardened, consumer device to gain code execution and dump the secure boot ROM.
arxiv  

DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles

open access: yes, 2023
Dynamic Wireless Power Transfer (DWPT) is a novel technology that allows charging an electric vehicle while driving thanks to a dedicated road infrastructure.
Bianchi, Tommaso   +2 more
core  

The Secure Generation of RSA Moduli Using Poor RNG [PDF]

open access: yesarXiv, 2012
We discuss a procedure, which should be called Lenstra's fix, for producing secure RSA moduli even when the random number generation is very poor.
arxiv  

Home - About - Disclaimer - Privacy