Leakage‐resilient message authentication code scheme based on hidden identity weak hash proof system [PDF]
Bin Wang
openalex +1 more source
A COMPETENT MAC SCHEME DESIGNED USING A UNIQUE DNA-BRNG KEY AND A NOVEL HASH ALGORITHM [PDF]
The current communication sector demands security over anything else. Considering the confidential data transmission and involvement of technology in everyday payment modes, many schemes have been employed in order to achieve this goal.
GURPREET K. SODHI, GURJOT S. GABA
doaj
Research and Implementation of Secure Upgrade Method for Embedded Control Software
In order to respond to challenges encountered in the software upgrade of embedded systems due to frequent demand changes and technological iterations, this paper presents the design of a secure software upgrade methodology and process.
CHEN Junbo, ZOU Junyang, ZHANG Tianyu
doaj
For years, combining the immutability associated with blockchain technology with the European Union’s General Data Protection Regulation (GDPR) has been considered a practically unsolvable conflict due to the very nature of blockchain and the GDPR.
Alvaro Gómez Vieites +2 more
doaj +1 more source
DAPA: Differential Analysis aided Power Attack on (Non-) Linear Feedback Shift Registers
Differential power analysis (DPA) is a form of side-channel analysis (SCA) that performs statistical analysis on the power traces of cryptographic computations.
Siang Meng Sim +2 more
doaj
Trusted data flow traceability mechanism for end-to-end encrypted instant messaging platforms
While end-to-end encryption (E2EE) improves privacy in instant messaging, it complicates auditing abusive content and tracing malicious information. To address this issue, a trusted data flow traceability mechanism (TDFTM) was proposed.
XIE Rongna +5 more
doaj
Security Authentication Scheme for Vehicle-to-Everything Computing Task Offloading Environments. [PDF]
Liu Y, Li C, Sun Q, Jiang H.
europepmc +1 more source
Security analysis of the RSSP-II protocol and a novel security enhancement approach
The railway signal safety protocol-Ⅱ (RSSP-Ⅱ), as the core security communication protocol of China’s train control system (CTCS-3), played a crucial role in ensuring the security and reliability of train communication.
FENG Tao +3 more
doaj
Lightweight Anonymous Authentication for IoT: A Taxonomy and Survey of Security Frameworks. [PDF]
Zhong J, He S, Liu Z, Xiong L.
europepmc +1 more source
Provably lightweight and secure IoHT scheme with post-quantum cryptography and fog computing: A comprehensive scheme for healthcare system. [PDF]
Abood EW +4 more
europepmc +1 more source

