Results 41 to 50 of about 2,626,008 (101)
Developed structural scheme implementation of an integrated security and formulated principles for the creation and development of an effective system of information security.
arxiv
Secure management of logs in internet of things [PDF]
Ever since the advent of computing, managing data has been of extreme importance. With innumerable devices getting added to network infrastructure, there has been a proportionate increase in the data which needs to be stored.
Gupta, Udit
core
Leveraging a Randomized Key Matrix to Enhance the Security of Symmetric Substitution Ciphers
An innovative strategy to enhance the security of symmetric substitution ciphers is presented, through the implementation of a randomized key matrix suitable for various file formats, including but not limited to binary and text files.
Dravid, Mihika+6 more
core
Ghosts of Deletions Past: New Secure Deletion Challenges and Solutions [PDF]
Is secure deletion of data still a problem?
arxiv
Cryptographic Authentication of Navigation Protocols [PDF]
We examine the security of existing radio navigation protocols and attempt to define secure, scalable replacements.
arxiv
Human behavior in image-based Road Health Inspection Systems despite the emerging AutoML. [PDF]
Siriborvornratanakul T.
europepmc +1 more source
A secure archive for Voice-over-IP conversations
An efficient archive securing the integrity of VoIP-based two-party conversations is presented. The solution is based on chains of hashes and continuously chained electronic signatures.
Hett, Christian+2 more
core +1 more source
Injecting Software Vulnerabilities with Voltage Glitching [PDF]
We show how voltage glitching can cause timing violations in CMOS behavior. Then we attack a real, security hardened, consumer device to gain code execution and dump the secure boot ROM.
arxiv
DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles
Dynamic Wireless Power Transfer (DWPT) is a novel technology that allows charging an electric vehicle while driving thanks to a dedicated road infrastructure.
Bianchi, Tommaso+2 more
core
The Secure Generation of RSA Moduli Using Poor RNG [PDF]
We discuss a procedure, which should be called Lenstra's fix, for producing secure RSA moduli even when the random number generation is very poor.
arxiv