28   Artículos

 
en línea
Muntadher Sallal, Ruairí de Fréin and Ali Malik    
Privacy and verifiability are crucial security requirements in e-voting systems and combining them is considered to be a challenge given that they seem to be contradictory. On one hand, privacy means that cast votes cannot be traced to the corresponding ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Alexandr Anatolyevich Olenev, Igor Anatolyevich Kalmykov, Vladimir Petrovich Pashintsev, Nikita Konstantinovich Chistousov, Daniil Vyacheslavovich Dukhovnyj and Natalya Igorevna Kalmykova    
Low-orbit satellite internet (LOSI) expands the scope of the Industrial Internet of Things (IIoT) in the oil and gas industry (OGI) to include areas of the Far North. However, due to the large length of the communication channel, the number of threats an... ver más
Revista: Information    Formato: Electrónico

 
en línea
Manal Rajeh AlShalaan and Suliman Mohamed Fati    
To address a business need, most organizations allow employees to use their own devices to enhance productivity and job satisfaction. For this purpose, the Bring Your Own Device (BYOD) policy provides controllable access for employees to organize data th... ver más
Revista: Information    Formato: Electrónico

 
en línea
Anish Saini, Athanasios Tsokanos and Raimund Kirner    
Cryptography is the study and practice of secure communication with digital data and focuses on confidentiality, integrity, and authentication. Random number generators (RNGs) generate random numbers to enhance security. Even though the cryptographic alg... ver más
Revista: Information    Formato: Electrónico

 
en línea
Athanasios Goudosis and Sokratis Katsikas    
The automatic identification system (AIS), despite its importance in worldwide navigation at sea, does not provide any defence mechanisms against deliberate misuse, e.g., by sea pirates, terrorists, business adversaries, or smugglers. Previous work has p... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Despoina Chochtoula, Aristidis Ilias, Yannis C. Stamatiou and Christos Makris    
SCADA systems monitor critical industrial, energy and other physical infrastructures in order to detect malfunctions, issue alerts and, in many cases, propose or even take remedial actions. However, due to their attachment to the Internet, SCADA systems ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Nahida Islam, Md. Sazzadur Rahman, Imtiaz Mahmud, Md. Nur Amin Sifat and You-Ze Cho    
The world is facing an urgent need to provide secure communication and data access control in advanced metering infrastructure (AMI) because conventional cryptographic key management and authentication protocols are at stake. The cryptography schemes ent... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mario Noseda, Lea Zimmerli, Tobias Schläpfer and Andreas Rüst    
New protocol stacks provide wireless IPv6 connectivity down to low power embedded IoT devices. From a security point of view, this leads to high exposure of such IoT devices. Consequently, even though they are highly resource-constrained, these IoT devic... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Nikita Konstantinovich Chistousov, Igor Anatolyevich Kalmykov, Daniil Vyacheslavovich Dukhovnyj, Maksim Igorevich Kalmykov and Aleksandr Anatolyevich Olenev    
Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Inter... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Kazuki Nakamura, Koji Hori and Shoichi Hirose    
Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on. Thus, the security of their hardware implementations is an import... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »