49   Artículos

 
en línea
Francisco Alonso, Benjamín Samaniego, Gonzalo Farias and Sebastián Dormido-Canto    
This article provides a general overview of the communication protocols used in the IEC61850 standard for the automation of electrical substations. Specifically, it examines the GOOSE and R-GOOSE protocols, which are used for exchanging various types of ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mario Alviano    
Client puzzle protocols are widely adopted mechanisms for defending against resource exhaustion denial-of-service (DoS) attacks. Among the simplest puzzles used by such protocols, there are cryptographic challenges requiring the finding of hash values wi... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Pratik Thantharate and Anurag Thantharate    
With the digitization of healthcare, an immense amount of sensitive medical data are generated and shared between various healthcare stakeholders?however, traditional health data management mechanisms present interoperability, security, and privacy chall... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
S.A. Bukashkin,M.A. Cherepnev     Pág. 104 - 108
Recently, many papers have appeared where it is proposed to use the quantum mechanical properties of interatomic interaction to solve cryptographic problems. In fact, we are talking about transferring the solution of the problem of the stability of infor... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Alexandr Anatolyevich Olenev, Igor Anatolyevich Kalmykov, Vladimir Petrovich Pashintsev, Nikita Konstantinovich Chistousov, Daniil Vyacheslavovich Dukhovnyj and Natalya Igorevna Kalmykova    
Low-orbit satellite internet (LOSI) expands the scope of the Industrial Internet of Things (IIoT) in the oil and gas industry (OGI) to include areas of the Far North. However, due to the large length of the communication channel, the number of threats an... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yukun Zhou, Ningsheng Wu, Baidong Hu, Yitao Zhang, Jingyun Qiu and Weiming Cai    
Face recognition payment is a new type of payment method, with AI face recognition technology as the core, and its speed and convenience are more in line with the users? payment habits. However, the face is a biological feature with weak privacy, and the... ver más
Revista: Information    Formato: Electrónico

 
en línea
Nahida Islam, Md. Sazzadur Rahman, Imtiaz Mahmud, Md. Nur Amin Sifat and You-Ze Cho    
The world is facing an urgent need to provide secure communication and data access control in advanced metering infrastructure (AMI) because conventional cryptographic key management and authentication protocols are at stake. The cryptography schemes ent... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Nikita Konstantinovich Chistousov, Igor Anatolyevich Kalmykov, Daniil Vyacheslavovich Dukhovnyj, Maksim Igorevich Kalmykov and Aleksandr Anatolyevich Olenev    
Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Inter... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
V. Belsky,E. Griboedova,K. Tsaregorodtsev,A. Chichaeva     Pág. 1 - 20
Radio-frequency tags (RFID tags) are widely used throughout the world to identify and authenticate objects. Due to the architectural features and in order to minimize implementation cost RFID tags are often subject to considerable restrictions (memory re... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Sergey Agafyin,Stanislav Smyshlyaev     Pág. 84 - 89
The task of enabling usage of cryptographic software (especially, for working with digital signature) with general-purpose mobile devices (e.g., smartphones with iOS or Android operation systems) is inevitably discussed during all conference discussions ... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »