Results 21 to 30 of about 1,501 (168)
There is growing awareness towards cybersecurity threats in power systems. IEC 61850 standard facilitates communication between different Intelligent Electronic devices (IEDs) and eases interoperable operation with set data and message structures.
S. M. Suhail Hussain +2 more
doaj +1 more source
On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving BBB Security
Observing the growing popularity of random permutation (RP)-based designs (e.g, Sponge), Bart Mennink in CRYPTO 2019 has initiated an interesting research in the direction of RP-based pseudorandom functions (PRFs).
Avik Chakraborti +3 more
doaj +1 more source
S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages
Standardized communication plays an important role in substation automation system (SAS). IEC 61850 is a de-facto standard in SAS. It facilitates smooth communication between different devices located in the substation by achieving interoperability ...
Shaik Mullapathi Farooq +2 more
doaj +1 more source
Aggregate Message Authentication Code Capable of Non-Adaptive Group-Testing
We introduce group-testing aggregate message authentication code (GTA MAC) and provide its formal study. We first specify its syntax and security requirements.
Shoichi Hirose, Junji Shikata
doaj +1 more source
Fog computing and the Internet of Things (IoT) played a crucial role in storing data in the third-party server. Fog computing provides various resources to collect data by managing data security.
M. Jalasri, L. Lakshmanan
doaj +1 more source
A VHDL Model for Implementation of MD5 Hash Algorithm [PDF]
With the increase of the amount of data and users in the information systems, the requirement of data integrity is needed to be improved as well, so the work has become necessary independently.
Mohammed A. Noaman
doaj +1 more source
A symbolic attribute-based access control model for data security in the cloud
There have been several attempts made in literature to develop access control techniques to stem data security problems. Many of these techniques had been found to have one deficiency or other.
Iyabo Felicia Oyeyinka +2 more
doaj +1 more source
Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography
Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications.
Shimaa A. Abdel Hakeem +2 more
doaj +1 more source
Digital images like military, medical and quality control images are increasingly stored over cloud server. These images need protection against attempts to manipulate them since manipulations could tamper the decisions based on these images, many ...
Sayyada Fahmeeda Sultana, D C Shubhangi
doaj +1 more source
mMIC: Multicast Message Integrity Code for Securing Low-Entropy Control Command
Although Industrial Control Systems (ICSs) continue to evolve with the introduction of Industrial Internet of Thing (IIoT), this advancement also introduces various threats and vulnerabilities in manufacturing industries and critical national ...
Samuel Woo, Minhye Seo, Chang-Seop Park
doaj +1 more source

