Results 91 to 100 of about 142,210 (279)

S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages

open access: yesEnergies, 2019
Standardized communication plays an important role in substation automation system (SAS). IEC 61850 is a de-facto standard in SAS. It facilitates smooth communication between different devices located in the substation by achieving interoperability ...
Shaik Mullapathi Farooq   +2 more
doaj   +1 more source

Keamanan Data Menggunakan Secure Hashing Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) pada Digital Signature

open access: yesJurnal Teknologi Informasi dan Ilmu Komputer, 2023
Penelitian ini mempelajari bagaimana kriptografi menggunakan Secure Hash Algorthm 256 (SHA-256) dan Rivest Shamir Adleman (RSA) untuk menjaga keaslian Surat Keterangan Lulus (SKL) dengan menggunakan kode Quick Response (QR) berbasis web.
Juniar Hutagalung   +2 more
doaj   +1 more source

Quantum attacks on Bitcoin, and how to protect against them [PDF]

open access: yes, 2017
The key cryptographic protocols used to secure the internet and financial transactions of today are all susceptible to attack by the development of a sufficiently large quantum computer.
Aggarwal, Divesh   +4 more
core   +3 more sources

Understanding the Association Between Bitcoin Mining and Environmental Sustainability in Light of the Sustainable Development Goals Through the DARDL and KRLS Methods

open access: yesSustainable Development, EarlyView.
ABSTRACT Assuring environmental sustainability is essential for the continuity of the ecosystem. Every sector of the economy has some degree of impact on environmental sustainability. The United Nations (UN)’ Sustainable Development Goals (SDGs) have placed these objectives within a broader global framework, offering a global plan aimed at ensuring ...
Ali Çelik, Metehan Özırmak
wiley   +1 more source

Fast Implementation of SHA-3 in GPU Environment

open access: yesIEEE Access, 2021
Recently, Graphic Processing Units (GPUs) have been widely used for general purpose applications such as machine learning applications, acceleration of cryptographic applications (especially, blockchains), etc.
Hojin Choi, Seog Chung Seo
doaj   +1 more source

An Analysis and Enumeration of the Blockchain and Future Implications [PDF]

open access: yes, 2020
The blockchain is a relatively new technology that has grown in interest and potential research since its inception. Blockchain technology is dominated by cryptocurrency in terms of usage.
LeBlanc, Nathanial
core   +1 more source

A Comprehensive Review of ns‐3‐Based Simulation Frameworks for LEO Satellite Constellations: Capabilities and Limitations

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Background Low Earth Orbit (LEO) satellite constellations are redefining the concept of global connectivity, opening up a new world of opportunities for communication services and applications. Purpose The emergence of LEO satellites (SATs) is ushering in a new era of innovation, where new complex technologies are being developed, and the use ...
Pilar Manzanares‐Lopez   +2 more
wiley   +1 more source

Short signature based on factoring problem in the standard model

open access: yesTongxin xuebao, 2011
A short signature scheme based on factoring problem in the standard model was proposed.To design this sig-nature scheme,the generic construction of fully-secure signatures from weakly-secure signatures and a chameleon hash were employed.A signature in ...
WANG Zhi-wei1, ZHANG Wei1
doaj   +2 more sources

Security Analysis of Speech Perceptual Hashing Authentication Algorithm

open access: yesInternational Journal of Security and Its Applications, 2016
Speech perceptual hashing authentication algorithm is an efficient method for content integrity authentication and identity authentication. But the algorithm becomes transparent under the principle of Kerckhoffs which makes the algorithm unsafe. In this paper, the algorithm is encrypted under the principle of Kerckhoffs to protect the security of the ...
Ren Zhan-wei   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy