Results 11 to 20 of about 1,501 (168)

Implementasi Sistem Otentikasi Dokumen Berbasis Quick Response (QR) Code dan Digital Signature

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2021
The authenticity and integrity of documents are essential in data exchange and communication. Digital documents must be verifiable for their authenticity and integrity by all parties that use the documents.
Antika Lorien, Theophilus Wellem
doaj   +1 more source

Paillier-Based Data Aggregation and Stimulation Scheme in the Smart Grid [PDF]

open access: yesJisuanji gongcheng, 2021
To address the privacy disclosure issues in data aggregation and stimulation in smart grids,a Paillier-based data aggregation and stimulation scheme is proposed for smart grids.The scheme employs a super-increasing sequence to construct multidimensional ...
ZHU Song, WANG Huaqun
doaj   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario

open access: yes网络与信息安全学报, 2020
With the development of intelligent transportation system,the vehicles will no longer be controlled by the traditional traffic light when they enter or leave the intersection.Instead,they will interact with the local server (LS) near the intersection and
Hao WANG   +3 more
doaj   +3 more sources

MARAS: Mutual Authentication and Role-Based Authorization Scheme for Lightweight Internet of Things Applications

open access: yesSensors, 2023
The Internet of things (IoT) accommodates lightweight sensor/actuator devices with limited resources; hence, more efficient methods for known challenges are sought after. Message queue telemetry transport (MQTT) is a publish/subscribe-based protocol that
Özlem Şeker   +2 more
doaj   +1 more source

Tag Generation Using Chaotic Sequences for Physical-Layer Authentication

open access: yesIEEE Access, 2023
We consider in this work a physical layer authentication method in which a message authentication code, referred to as a tag, is transmitted along with the data message to provide a robust authentication method.
Joao V. C. Evangelista   +3 more
doaj   +1 more source

New hash function based on C-MD structure and chaotic neural network

open access: yes网络与信息安全学报, 2023
In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile ...
Liquan CHEN, Yuhang ZHU, Yu WANG, Zhongyuan QIN, Yang MA
doaj   +3 more sources

Design and Analysis of Lightweight Authentication Protocol for Securing IoD

open access: yesIEEE Access, 2021
The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones’ navigation services. The main entities in IoD
Saeed Ullah Jan   +2 more
doaj   +1 more source

Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications

open access: yesIEEE Access, 2022
In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of applications such as ensuring the authentication and integrity of the data, in forensic investigation ...
Darshana Upadhyay   +3 more
doaj   +1 more source

CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks

open access: yesSensors, 2022
Automotive cyber-physical systems are in transition from the closed-systems to open-networking systems. As a result, in-vehicle networks such as the controller area network (CAN) have become essential to connect to inter-vehicle networks through the ...
Youngmi Baek, Seongjoo Shin
doaj   +1 more source

Home - About - Disclaimer - Privacy