63   Artículos

 
en línea
Francisco Alonso, Benjamín Samaniego, Gonzalo Farias and Sebastián Dormido-Canto    
This article provides a general overview of the communication protocols used in the IEC61850 standard for the automation of electrical substations. Specifically, it examines the GOOSE and R-GOOSE protocols, which are used for exchanging various types of ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Stanislav Marochok and Pavol Zajac    
Cryptographic S-boxes are vectorial Boolean functions that must fulfill strict criteria to provide security for cryptographic algorithms. There are several existing methods for generating strong cryptographic S-boxes, including stochastic search algorith... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Hasan Hashim, Ahmad Reda Alzighaibi, Amaal Farag Elessawy, Ibrahim Gad, Hatem Abdul-Kader and Asmaa Elsaid    
A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending atta... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Marin Vidakovic and Kruno Milicevic    
The continuous development of quantum computing necessitates the development of quantum-resistant cryptographic algorithms. In response to this demand, the National Institute of Standards and Technology selected standardized algorithms including Crystals... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Sherin M. Omran, Wessam H. El-Behaidy and Aliaa A. A. Youssif    
A cryptocurrency is a non-centralized form of money that facilitates financial transactions using cryptographic processes. It can be thought of as a virtual currency or a payment mechanism for sending and receiving money online. Cryptocurrencies have gai... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Argyrios Sideris and Minas Dasygenis    
Information is transmitted between multiple insecure routing hops in text, image, video, and audio. Thus, this multi-hop digital data transfer makes secure transmission with confidentiality and integrity imperative. This protection of the transmitted dat... ver más
Revista: Computation    Formato: Electrónico

 
en línea
Argyrios Sideris, Theodora Sanida and Minas Dasygenis    
Hash functions are an essential mechanism in today?s world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo-random sequences, and deriving keys for various applications, including milit... ver más
Revista: Information    Formato: Electrónico

 
en línea
Abidemi Emmanuel Adeniyi, Sanjay Misra, Eniola Daniel and Anthony Bokolo, Jr.    
Background: The technological revolution has allowed users to exchange data and information in various fields, and this is one of the most prevalent uses of computer technologies. However, in a world where third parties are capable of collecting, stealin... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Yukun Zhou, Ningsheng Wu, Baidong Hu, Yitao Zhang, Jingyun Qiu and Weiming Cai    
Face recognition payment is a new type of payment method, with AI face recognition technology as the core, and its speed and convenience are more in line with the users? payment habits. However, the face is a biological feature with weak privacy, and the... ver más
Revista: Information    Formato: Electrónico

 
en línea
Emmanuel A. Adeniyi, Peace Busola Falola, Mashael S. Maashi, Mohammed Aljebreen and Salil Bharany    
With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users? credentials and sensitive information. Therefore, ... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 4     Siguiente »