Results 11 to 20 of about 352,688 (269)
Fast Implementation of NIST P-256 Elliptic Curve Cryptography on 8-Bit AVR Processor
In this paper, we present a highly optimized implementation of elliptic curve cryptography (ECC) over NIST P-256 curve for an 8-bit AVR microcontroller. For improving the performance of ECC implementation, we focus on optimizing field arithmetics.
Dong-won Park +3 more
doaj +1 more source
Problem of Personal Data Security and the Phenomenon of Post-Privacy in the Digital Society [PDF]
The purpose of the article is to conceptualize the changes that are taking place in the perception of information privacy in today’s digital society. The relevance of the work is due to the development of modern information and communication technologies,
Lesya V. Chesnokova
doaj +1 more source
With the increasing number of side-channel attacks, countermeasure designers continue to develop various implementations to address such threats. Power-balancing (PB) methods hold the number of 1s and/or transitions (i.e., Hamming weight/distance) of ...
HanBit Kim, HeeSeok Kim, Seokhie Hong
doaj +1 more source
Delivering Smart Governance in a Future City: The Case of Glasgow
In 2013, Glasgow City Council received significant funding to develop innovative smart city applications, including the delivery of new electronic public services and the co-production of governance.
Charles Leleux, C. William R. Webster
doaj +1 more source
An Exploratory Study on the Taiwanese Primary and Secondary School Teachers’ Understanding of Personal Data Protection Act [PDF]
In this study, the researchers would like to explore Taiwanese primary and secondary school teachers’ understanding on the provisions of the Personal Data Protection Act (hereinafter referred to as “PDPA”).
Mei-Lien Hsueh, Chien Chou
doaj +1 more source
A Multi-Component Analysis of CPTED in the Cyberspace Domain
The visual fidelity of a virtual environment lacks the exceedingly complex layers from the physical world, but the continuous improvements of image rendering technology and computation powers have led to greater demands for virtual simulations. Our study
Jemin Justin Lee +7 more
doaj +1 more source
Single Trace Side Channel Analysis on NTRU Implementation
As researches on the quantum computer have progressed immensely, interests in post-quantum cryptography have greatly increased. NTRU is one of the well-known algorithms due to its practical key sizes and fast performance along with the resistance against
Soojung An +4 more
doaj +1 more source
Forensic Issues and Techniques to Improve Security in SSD With Flex Capacity Feature
Over-provisioning technology is typically introduced as a means to improve the performance of storage systems, such as databases. The over-provisioning area is both hidden and difficult for normal users to access.
Na Young Ahn, Dong Hoon Lee
doaj +1 more source
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee +3 more
doaj +1 more source
Concept, Examples and Jurisprudential and Legal Documents of Family Privacy [PDF]
Privacy is a set of beliefs, practices, behaviors, characteristics, and circumstances of any person that is not obvius to public and he or she is reluctant to disclose it and reacts to others' intrusion or supervision. This is one of the most fundamental
abolghasem naghibi, Masumeh shahriari
doaj +1 more source

