Results 11 to 20 of about 23,175 (170)

Implementasi Sistem Otentikasi Dokumen Berbasis Quick Response (QR) Code dan Digital Signature

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2021
The authenticity and integrity of documents are essential in data exchange and communication. Digital documents must be verifiable for their authenticity and integrity by all parties that use the documents.
Antika Lorien, Theophilus Wellem
doaj   +1 more source

Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario

open access: yes网络与信息安全学报, 2020
With the development of intelligent transportation system,the vehicles will no longer be controlled by the traditional traffic light when they enter or leave the intersection.Instead,they will interact with the local server (LS) near the intersection and
Hao WANG   +3 more
doaj   +3 more sources

MARAS: Mutual Authentication and Role-Based Authorization Scheme for Lightweight Internet of Things Applications

open access: yesSensors, 2023
The Internet of things (IoT) accommodates lightweight sensor/actuator devices with limited resources; hence, more efficient methods for known challenges are sought after. Message queue telemetry transport (MQTT) is a publish/subscribe-based protocol that
Özlem Şeker   +2 more
doaj   +1 more source

Tag Generation Using Chaotic Sequences for Physical-Layer Authentication

open access: yesIEEE Access, 2023
We consider in this work a physical layer authentication method in which a message authentication code, referred to as a tag, is transmitted along with the data message to provide a robust authentication method.
Joao V. C. Evangelista   +3 more
doaj   +1 more source

New hash function based on C-MD structure and chaotic neural network

open access: yes网络与信息安全学报, 2023
In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile ...
Liquan CHEN, Yuhang ZHU, Yu WANG, Zhongyuan QIN, Yang MA
doaj   +3 more sources

Design and Analysis of Lightweight Authentication Protocol for Securing IoD

open access: yesIEEE Access, 2021
The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones’ navigation services. The main entities in IoD
Saeed Ullah Jan   +2 more
doaj   +1 more source

Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications

open access: yesIEEE Access, 2022
In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of applications such as ensuring the authentication and integrity of the data, in forensic investigation ...
Darshana Upadhyay   +3 more
doaj   +1 more source

A Multi-User, Single-Authentication Protocol for Smart Grid Architectures [PDF]

open access: yes, 2020
open access articleIn a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data
Al-Bayatti, Ali Hilal   +2 more
core   +2 more sources

CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks

open access: yesSensors, 2022
Automotive cyber-physical systems are in transition from the closed-systems to open-networking systems. As a result, in-vehicle networks such as the controller area network (CAN) have become essential to connect to inter-vehicle networks through the ...
Youngmi Baek, Seongjoo Shin
doaj   +1 more source

Analysis and Implementation of Message Authentication Code (MAC) Algorithms for GOOSE Message Security

open access: yesIEEE Access, 2019
There is growing awareness towards cybersecurity threats in power systems. IEC 61850 standard facilitates communication between different Intelligent Electronic devices (IEDs) and eases interoperable operation with set data and message structures.
S. M. Suhail Hussain   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy