Results 21 to 30 of about 23,175 (170)
On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving BBB Security
Observing the growing popularity of random permutation (RP)-based designs (e.g, Sponge), Bart Mennink in CRYPTO 2019 has initiated an interesting research in the direction of RP-based pseudorandom functions (PRFs).
Avik Chakraborti +3 more
doaj +1 more source
Biometric identity-based cryptography for e-Government environment [PDF]
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core +1 more source
Aggregate Message Authentication Code Capable of Non-Adaptive Group-Testing
We introduce group-testing aggregate message authentication code (GTA MAC) and provide its formal study. We first specify its syntax and security requirements.
Shoichi Hirose, Junji Shikata
doaj +1 more source
S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages
Standardized communication plays an important role in substation automation system (SAS). IEC 61850 is a de-facto standard in SAS. It facilitates smooth communication between different devices located in the substation by achieving interoperability ...
Shaik Mullapathi Farooq +2 more
doaj +1 more source
Fog computing and the Internet of Things (IoT) played a crucial role in storing data in the third-party server. Fog computing provides various resources to collect data by managing data security.
M. Jalasri, L. Lakshmanan
doaj +1 more source
On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals [PDF]
The importance of the Electronic Health Record (EHR) has been addressed in recent years by governments and institutions.Many large scale projects have been funded with the aim to allow healthcare professionals to consult patients data. Properties such as
A. Armando +10 more
core +1 more source
A VHDL Model for Implementation of MD5 Hash Algorithm [PDF]
With the increase of the amount of data and users in the information systems, the requirement of data integrity is needed to be improved as well, so the work has become necessary independently.
Mohammed A. Noaman
doaj +1 more source
A symbolic attribute-based access control model for data security in the cloud
There have been several attempts made in literature to develop access control techniques to stem data security problems. Many of these techniques had been found to have one deficiency or other.
Iyabo Felicia Oyeyinka +2 more
doaj +1 more source
SEABASS: Symmetric-keychain Encryption and Authentication for Building Automation Systems [PDF]
There is an increasing security risk in Building Automation Systems (BAS) in that its communication is unprotected, resulting in the adversary having the capability to inject spurious commands to the actuators to alter the behaviour of BAS.
Keoh, Sye Loong +3 more
core +1 more source
Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography
Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications.
Shimaa A. Abdel Hakeem +2 more
doaj +1 more source

