Results 31 to 40 of about 11,160 (119)
Impact of Cyberphysical Attacks on Load Tap Changers and Distribution System Voltage Stability
In this paper, we analysed the impact of a cyberphysical attack manipulating the operation of the LTC. In addition, we analysed the effect of load drop and PV while LTC is being manipulated. The cyber vulnerabilities leading to the attack were explored. ABSTRACT Load tap changers (LTCs) play a critical role in voltage regulation, and their manipulation
Anas AlMajali +4 more
wiley +1 more source
Handling Confidential Data on the Untrusted Cloud: An Agent-based Approach [PDF]
Cloud computing allows shared computer and storage facilities to be used by a multitude of clients. While cloud management is centralized, the information resides in the cloud and information sharing can be implemented via off-the-shelf techniques for ...
Damiani, Ernesto, Pagano, Francesco
core +1 more source
Summary Monoterpene indole alkaloids (MIA) are a diverse class of plant natural products produced by a subset of lineages within the Asterid clade of eudicots. The diversity of MIAs provides a unique opportunity to study not only the evolution of biosynthetic genes but also their regulation.
Chenxin Li +7 more
wiley +1 more source
Safe and Quickest Medical Image Encryption Using Logistic Map Derived S‐Boxes and Galois Field
The pseudorandomness, simplicity of use, and extreme sensitivity to even the slightest change in the initial value and handling parameters make chaotic maps attractive. The use of medical imaging to diagnose illnesses has grown in significance. These photographs need strong security measures because they are exchanged over public networks.
Mahwish Bano +5 more
wiley +1 more source
A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej +4 more
wiley +1 more source
SIGABA is a World War II cipher machine used by the United States. Both the United States Army and the United States Navy used it for tactical communication.
Chan, Wing
core +4 more sources
Securing End‐To‐End Encrypted File Sharing Services With the Messaging Layer Security Protocol
ABSTRACT Secure file sharing is essential in today's digital environment, yet many systems remain vulnerable: if an attacker steals client keys, they can often decrypt both past and future content. To address this challenge, we propose a novel file‐sharing architecture that strengthens post‐compromise security while remaining practical.
Roland Helmich, Lars Braubach
wiley +1 more source
This study proposed physical unclonable function based multi‐level key space generation scheme. By exploiting speckle characteristic, a size‐controllable structure is achieved and that is suitable foundation for multiple key extraction. The flexible key space supports various specifications for advanced applications, such as hierarchical authentication
Jeong Jin Kim, Min Seong Kim, Gil Ju Lee
wiley +1 more source
On Distinct Known Plaintext Attacks
Among statistical attacks, we often make a distinction between attacks in the linear context, for which the knowledge of plaintexts and corresponding ciphertexts is enough to perform the attack, and attacks in the differential context, for which the plaintexts are chosen. Such attacks are usually referred as known-or chosen-plaintext attacks.
Blondeau, Céline, Nyberg, Kaisa
openaire +1 more source
Public-key cryptography and invariant theory
Public-key cryptosystems are suggested based on invariants of groups.
Grigoriev, D.
core +1 more source

