22   Artículos

 
en línea
Zahra Ebadi Ansaroudi, Rocco Zaccagnino and Paolo D?Arco    
Pseudorandomness is a crucial property that the designers of cryptographic primitives aim to achieve. It is also a key requirement in the calls for proposals of new primitives, as in the case of block ciphers. Therefore, the assessment of the property is... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ernesto Gómez-Marín, Valerio Senni, Luis Parrilla, Jose L. Tejero López, Encarnación Castillo and Davide Martintoni    
The accurate tracking of every production step and related outcome in a supply chain is a stringent requirement in safety-critical sectors such as civil aviation. In such a framework, trusted traceability and accountability can be reliably and securely m... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Muntadher Sallal, Ruairí de Fréin and Ali Malik    
Privacy and verifiability are crucial security requirements in e-voting systems and combining them is considered to be a challenge given that they seem to be contradictory. On one hand, privacy means that cast votes cannot be traced to the corresponding ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Souhail Meftah, Shuhao Zhang, Bharadwaj Veeravalli and Khin Mi Mi Aung    
The appealing properties of secure hardware solutions such as trusted execution environment (TEE) including low computational overhead, confidentiality guarantee, and reduced attack surface have prompted considerable interest in adopting them for secure ... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Mario Noseda, Lea Zimmerli, Tobias Schläpfer and Andreas Rüst    
New protocol stacks provide wireless IPv6 connectivity down to low power embedded IoT devices. From a security point of view, this leads to high exposure of such IoT devices. Consequently, even though they are highly resource-constrained, these IoT devic... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Oleg A. Logachev,Sergey N. Fedorov     Pág. 33 - 38
The classic blockchain design implies the mining procedure, which is essentially reflected in the following: to add a new block to the chain, a user has to solve an instance of some moderately hard computational problem (Proof-of-Workframe... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Yi-Fan Tseng, Zi-Yuan Liu and Raylin Tso    
Inner product encryption, first introduced by Katz et al., is a type of predicate encryption in which a ciphertext and a private key correspond to an attribute vector and a predicate vector, respectively. Only if the attribute and predicate vectors satis... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Gregory Hill and Xavier Bellekens    
Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike. Established preventive measures per... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jheng-Jia Huang, Yi-Fan Tseng, Qi-Liang Yang and Chun-I Fan    
Authentication has been adopted in many areas, but most of these authentication schemes are built using traditional cryptographic primitives. It is widely believed that such primitives are not resistant to quantum algorithms. To deal with those quantum a... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jyotirmoy Das,Sangeeta Kakoty,Majidul Ahmed     Pág. 70 - 76
The access to digital data by the users has increased in recent times with the advent of data communication technologies and its popularization. The data which is in digital form has to pass through insecure channels, for example when a user accesses the... ver más
Revista: IRA-International Journal of Technology & Engineering    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »