48   Artículos

 
en línea
Shunfang Hu, Shaoping Jiang, Qing Miao, Fan Yang, Weihong Zhou and Peng Duan    
With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting user privacy have become increasingly challenging. End devices in the IoT are often deployed in unattended environments and connected to open networks, making ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Argyrios Sideris, Theodora Sanida and Minas Dasygenis    
Hash functions are an essential mechanism in today?s world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo-random sequences, and deriving keys for various applications, including milit... ver más
Revista: Information    Formato: Electrónico

 
en línea
Hongming Li, Lilai Zhang, Hao Cao and Yirui Wu    
Deoxyribonucleic Acid (DNA) computing has demonstrated great potential in data encryption due to its capability of parallel computation, minimal storage requirement, and unbreakable cryptography. Focusing on high-dimensional image data for encryption wit... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jianan Bai, Danyang Qin, Ping Zheng and Lin Ma    
In visual indoor positioning systems, the method of constructing a visual map by point-by-point sampling is widely used due to its characteristics of clear static images and simple coordinate calculation. However, too small a sampling interval will cause... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Kithmini Godewatte Arachchige, Philip Branch and Jason But    
With the development of Internet of Things (IoT) technologies, industries such as healthcare have started using low-powered sensor-based devices. Because IoT devices are typically low-powered, they are susceptible to cyber intrusions. As an emerging info... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Khai-Minh Ma, Duc-Hung Le, Cong-Kha Pham and Trong-Thuc Hoang    
The security of Internet of Things (IoTs) devices in recent years has created interest in developing implementations of lightweight cryptographic algorithms for such systems. Additionally, open-source hardware and field-programable gate arrays (FPGAs) ar... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Wenxiao Li, Hongyan Mei, Yutian Li, Jiayao Yu, Xing Zhang, Xiaorong Xue and Jiahao Wang    
Due to the fast retrieval speed and low storage cost, cross-modal hashing has become the primary method for cross-modal retrieval. Since the emergence of deep cross-modal hashing methods, cross-modal retrieval significantly improved. However, the existin... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Aleksey I. Pakhomchik, Vladimir V. Voloshinov, Valerii M. Vinokur and Gordey B. Lesovik    
There exists a wide range of constraint programming (CP) problems defined on Boolean functions depending on binary variables. One of the approaches to solving CP problems is using specific appropriate solvers, e.g., SAT solvers. An alternative is using t... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Kunbolat Algazy, Kairat Sakan, Nursulu Kapalova, Saule Nyssanbayeva and Dilmukhanbet Dyusenbayev    
The article observes the new hashing algorithm HBC-256. The HBC-256 algorithm is based on the block cipher of the compression function CF (Compression Function) and produces a 256-bits hash value. Like any new cryptographic structure, the HBC-256 algorit... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yurika Pant Khanal, Abeer Alsadoon, Khurram Shahzad, Ahmad B. Al-Khalil, Penatiyana W. C. Prasad, Sabih Ur Rehman and Rafiqul Islam    
Blockchain technology has been widely advocated for security and privacy in IoT systems. However, a major impediment to its successful implementation is the lack of privacy protection regarding user access policy while accessing personal data in the IoT ... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »