Results 21 to 30 of about 1,501 (168)

Analysis and Implementation of Message Authentication Code (MAC) Algorithms for GOOSE Message Security

open access: yesIEEE Access, 2019
There is growing awareness towards cybersecurity threats in power systems. IEC 61850 standard facilitates communication between different Intelligent Electronic devices (IEDs) and eases interoperable operation with set data and message structures.
S. M. Suhail Hussain   +2 more
doaj   +1 more source

On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving BBB Security

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Observing the growing popularity of random permutation (RP)-based designs (e.g, Sponge), Bart Mennink in CRYPTO 2019 has initiated an interesting research in the direction of RP-based pseudorandom functions (PRFs).
Avik Chakraborti   +3 more
doaj   +1 more source

S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages

open access: yesEnergies, 2019
Standardized communication plays an important role in substation automation system (SAS). IEC 61850 is a de-facto standard in SAS. It facilitates smooth communication between different devices located in the substation by achieving interoperability ...
Shaik Mullapathi Farooq   +2 more
doaj   +1 more source

Aggregate Message Authentication Code Capable of Non-Adaptive Group-Testing

open access: yesIEEE Access, 2020
We introduce group-testing aggregate message authentication code (GTA MAC) and provide its formal study. We first specify its syntax and security requirements.
Shoichi Hirose, Junji Shikata
doaj   +1 more source

Code-based encryption techniques with distributed cluster head and energy consumption routing protocol

open access: yesComplex & Intelligent Systems, 2021
Fog computing and the Internet of Things (IoT) played a crucial role in storing data in the third-party server. Fog computing provides various resources to collect data by managing data security.
M. Jalasri, L. Lakshmanan
doaj   +1 more source

A VHDL Model for Implementation of MD5 Hash Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2013
With the increase of the amount of data and users in the information systems, the requirement of data integrity is needed to be improved as well, so the work has become necessary independently.
Mohammed A. Noaman
doaj   +1 more source

A symbolic attribute-based access control model for data security in the cloud

open access: yesITEGAM-JETIA, 2021
There have been several attempts made in literature to develop access control techniques to stem data security problems. Many of these techniques had been found to have one deficiency or other.
Iyabo Felicia Oyeyinka   +2 more
doaj   +1 more source

Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography

open access: yesSensors, 2020
Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications.
Shimaa A. Abdel Hakeem   +2 more
doaj   +1 more source

AUTHENTICATION, TAMPER LOCALIZATION AND RECTIFICATION ALGORITHM WITH PRIVACY PRESERVATION OF IMAGE FOR THE CLOUD USING HMAC

open access: yesICTACT Journal on Image and Video Processing, 2017
Digital images like military, medical and quality control images are increasingly stored over cloud server. These images need protection against attempts to manipulate them since manipulations could tamper the decisions based on these images, many ...
Sayyada Fahmeeda Sultana, D C Shubhangi
doaj   +1 more source

mMIC: Multicast Message Integrity Code for Securing Low-Entropy Control Command

open access: yesIEEE Access
Although Industrial Control Systems (ICSs) continue to evolve with the introduction of Industrial Internet of Thing (IIoT), this advancement also introduces various threats and vulnerabilities in manufacturing industries and critical national ...
Samuel Woo, Minhye Seo, Chang-Seop Park
doaj   +1 more source

Home - About - Disclaimer - Privacy