Results 11 to 20 of about 1,501 (168)
Implementasi Sistem Otentikasi Dokumen Berbasis Quick Response (QR) Code dan Digital Signature
The authenticity and integrity of documents are essential in data exchange and communication. Digital documents must be verifiable for their authenticity and integrity by all parties that use the documents.
Antika Lorien, Theophilus Wellem
doaj +1 more source
Paillier-Based Data Aggregation and Stimulation Scheme in the Smart Grid [PDF]
To address the privacy disclosure issues in data aggregation and stimulation in smart grids,a Paillier-based data aggregation and stimulation scheme is proposed for smart grids.The scheme employs a super-increasing sequence to construct multidimensional ...
ZHU Song, WANG Huaqun
doaj +1 more source
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan +7 more
wiley +1 more source
Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario
With the development of intelligent transportation system,the vehicles will no longer be controlled by the traditional traffic light when they enter or leave the intersection.Instead,they will interact with the local server (LS) near the intersection and
Hao WANG +3 more
doaj +3 more sources
The Internet of things (IoT) accommodates lightweight sensor/actuator devices with limited resources; hence, more efficient methods for known challenges are sought after. Message queue telemetry transport (MQTT) is a publish/subscribe-based protocol that
Özlem Şeker +2 more
doaj +1 more source
Tag Generation Using Chaotic Sequences for Physical-Layer Authentication
We consider in this work a physical layer authentication method in which a message authentication code, referred to as a tag, is transmitted along with the data message to provide a robust authentication method.
Joao V. C. Evangelista +3 more
doaj +1 more source
New hash function based on C-MD structure and chaotic neural network
In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile ...
Liquan CHEN, Yuhang ZHU, Yu WANG, Zhongyuan QIN, Yang MA
doaj +3 more sources
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones’ navigation services. The main entities in IoD
Saeed Ullah Jan +2 more
doaj +1 more source
In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of applications such as ensuring the authentication and integrity of the data, in forensic investigation ...
Darshana Upadhyay +3 more
doaj +1 more source
CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks
Automotive cyber-physical systems are in transition from the closed-systems to open-networking systems. As a result, in-vehicle networks such as the controller area network (CAN) have become essential to connect to inter-vehicle networks through the ...
Youngmi Baek, Seongjoo Shin
doaj +1 more source

