Results 71 to 80 of about 23,175 (170)

A COMPETENT MAC SCHEME DESIGNED USING A UNIQUE DNA-BRNG KEY AND A NOVEL HASH ALGORITHM [PDF]

open access: yesJournal of Engineering Science and Technology, 2018
The current communication sector demands security over anything else. Considering the confidential data transmission and involvement of technology in everyday payment modes, many schemes have been employed in order to achieve this goal.
GURPREET K. SODHI, GURJOT S. GABA
doaj  

Research and Implementation of Secure Upgrade Method for Embedded Control Software

open access: yesKongzhi Yu Xinxi Jishu
In order to respond to challenges encountered in the software upgrade of embedded systems due to frequent demand changes and technological iterations, this paper presents the design of a secure software upgrade methodology and process.
CHEN Junbo, ZOU Junyang, ZHANG Tianyu
doaj  

GDPR-Compliant Academic Certification via Blockchain: Legal and Technical Validation of the GAVIN Project

open access: yesApplied Sciences
For years, combining the immutability associated with blockchain technology with the European Union’s General Data Protection Regulation (GDPR) has been considered a practically unsolvable conflict due to the very nature of blockchain and the GDPR.
Alvaro Gómez Vieites   +2 more
doaj   +1 more source

DAPA: Differential Analysis aided Power Attack on (Non-) Linear Feedback Shift Registers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Differential power analysis (DPA) is a form of side-channel analysis (SCA) that performs statistical analysis on the power traces of cryptographic computations.
Siang Meng Sim   +2 more
doaj  

Trusted data flow traceability mechanism for end-to-end encrypted instant messaging platforms

open access: yesTongxin xuebao
While end-to-end encryption (E2EE) improves privacy in instant messaging, it complicates auditing abusive content and tracing malicious information. To address this issue, a trusted data flow traceability mechanism (TDFTM) was proposed.
XIE Rongna   +5 more
doaj  

Security analysis of the RSSP-II protocol and a novel security enhancement approach

open access: yes网络与信息安全学报
The railway signal safety protocol-Ⅱ (RSSP-Ⅱ), as the core security communication protocol of China’s train control system (CTCS-3), played a crucial role in ensuring the security and reliability of train communication.
FENG Tao   +3 more
doaj  

Home - About - Disclaimer - Privacy