Results 21 to 30 of about 23,175 (170)

On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving BBB Security

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Observing the growing popularity of random permutation (RP)-based designs (e.g, Sponge), Bart Mennink in CRYPTO 2019 has initiated an interesting research in the direction of RP-based pseudorandom functions (PRFs).
Avik Chakraborti   +3 more
doaj   +1 more source

Biometric identity-based cryptography for e-Government environment [PDF]

open access: yes, 2014
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core   +1 more source

Aggregate Message Authentication Code Capable of Non-Adaptive Group-Testing

open access: yesIEEE Access, 2020
We introduce group-testing aggregate message authentication code (GTA MAC) and provide its formal study. We first specify its syntax and security requirements.
Shoichi Hirose, Junji Shikata
doaj   +1 more source

S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages

open access: yesEnergies, 2019
Standardized communication plays an important role in substation automation system (SAS). IEC 61850 is a de-facto standard in SAS. It facilitates smooth communication between different devices located in the substation by achieving interoperability ...
Shaik Mullapathi Farooq   +2 more
doaj   +1 more source

Code-based encryption techniques with distributed cluster head and energy consumption routing protocol

open access: yesComplex & Intelligent Systems, 2021
Fog computing and the Internet of Things (IoT) played a crucial role in storing data in the third-party server. Fog computing provides various resources to collect data by managing data security.
M. Jalasri, L. Lakshmanan
doaj   +1 more source

On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals [PDF]

open access: yes, 2009
The importance of the Electronic Health Record (EHR) has been addressed in recent years by governments and institutions.Many large scale projects have been funded with the aim to allow healthcare professionals to consult patients data. Properties such as
A. Armando   +10 more
core   +1 more source

A VHDL Model for Implementation of MD5 Hash Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2013
With the increase of the amount of data and users in the information systems, the requirement of data integrity is needed to be improved as well, so the work has become necessary independently.
Mohammed A. Noaman
doaj   +1 more source

A symbolic attribute-based access control model for data security in the cloud

open access: yesITEGAM-JETIA, 2021
There have been several attempts made in literature to develop access control techniques to stem data security problems. Many of these techniques had been found to have one deficiency or other.
Iyabo Felicia Oyeyinka   +2 more
doaj   +1 more source

SEABASS: Symmetric-keychain Encryption and Authentication for Building Automation Systems [PDF]

open access: yes, 2018
There is an increasing security risk in Building Automation Systems (BAS) in that its communication is unprotected, resulting in the adversary having the capability to inject spurious commands to the actuators to alter the behaviour of BAS.
Keoh, Sye Loong   +3 more
core   +1 more source

Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography

open access: yesSensors, 2020
Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications.
Shimaa A. Abdel Hakeem   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy