Results 101 to 110 of about 147,726 (298)
An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme
The rapid emergence of quantum computing threatens current Supervisory Control and Data Acquisition (SCADA) security standards, mainly, American Gas Association (AGA)-12.
Sagarika Ghosh +3 more
doaj +1 more source
ABSTRACT The Split Delivery Vehicle Routing Problem with Two‐dimensional Loading Constraints (2L‐SDVRP) integrates vehicle routing, split delivery, and two‐dimensional packing constraints. In the 2L‐SDVRP, customers can be served by multiple vehicles, and their demands consist of different two‐dimensional rectangular items that must be packed in the ...
Kamyla Maria Ferreira +4 more
wiley +1 more source
Short signature based on factoring problem in the standard model
A short signature scheme based on factoring problem in the standard model was proposed.To design this sig-nature scheme,the generic construction of fully-secure signatures from weakly-secure signatures and a chameleon hash were employed.A signature in ...
WANG Zhi-wei1, ZHANG Wei1
doaj +2 more sources
Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms [PDF]
We propose two practical and provably secure password hashing algorithms, Pleco and Plectron. They are built upon well-understood cryptographic algorithms, and combine advantages of symmetric and asymmetric primitives. By employing the Rabin cryptosystem, we prove that the one-wayness of Pleco is at least as strong as the hard problem of integer ...
Guang Gong, Xinxin Fan, Bo Zhu
openaire +2 more sources
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye +8 more
wiley +1 more source
SIG-DB: leveraging homomorphic encryption to Securely Interrogate privately held Genomic DataBases
Genomic data are becoming increasingly valuable as we develop methods to utilize the information at scale and gain a greater understanding of how genetic information relates to biological function.
Flower, Audrey +8 more
core +2 more sources
Security Analysis of Speech Perceptual Hashing Authentication Algorithm
Speech perceptual hashing authentication algorithm is an efficient method for content integrity authentication and identity authentication. But the algorithm becomes transparent under the principle of Kerckhoffs which makes the algorithm unsafe. In this paper, the algorithm is encrypted under the principle of Kerckhoffs to protect the security of the ...
Ren Zhan-wei +4 more
openaire +1 more source
A Risk Manager for Intrusion Tolerant Systems: Enhancing HAL 9000 With New Scoring and Data Sources
ABSTRACT Background Intrusion Tolerant Systems (ITS) aim to maintain system security despite adversarial presence by limiting the impact of successful attacks. Current ITS risk managers rely heavily on public databases like NVD and Exploit DB, which suffer from long delays in vulnerability evaluation, reducing system responsiveness. Objective This work
Tadeu Freitas +6 more
wiley +1 more source
Blockchain and Digital Technologies in the Telecommunications Industry
ABSTRACT This article examines how fourth industrial revolution (4IR) technologies, specifically blockchain and digital twin technologies, can be utilized to address the energy supply challenge and enhance the management of distributed telecom infrastructure assets in a research context.
Charles Okeyia +3 more
wiley +1 more source
Vulnerabilities and Limitations of MQTT Protocol Used between IoT Devices
With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these, underlining the necessity of developing and implementing mechanisms to ...
Dan Dinculeană, Xiaochun Cheng
doaj +1 more source

