|
|
|
Ted H. Szymanski
The next-generation ?Industrial Internet of Things? (IIoT) will support ?Machine-to-Machine? (M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and require guaranteed cyber-security. This paper explores hardware-enforced cyber-securi...
ver más
|
|
|
|
|
|
|
Alexandr Kuznetsov, Mikolaj Karpinski, Ruslana Ziubina, Sergey Kandiy, Emanuele Frontoni, Oleksandr Peliukh, Olga Veselska and Ruslan Kozak
The problem of nonlinear substitution generation (S-boxes) is investigated in many related works in symmetric key cryptography. In particular, the strength of symmetric ciphers to linear cryptanalysis is directly related to the nonlinearity of substituti...
ver más
|
|
|
|
|
|
|
Mohammed El-hajj, Hussien Mousawi and Ahmad Fadlallah
Highly constrained devices that are interconnected and interact to complete a task are being used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems, distributed control systems, vehicular systems, wireless sensor netw...
ver más
|
|
|
|
|
|
|
Mauro Tropea, Mattia Giovanni Spina, Floriano De Rango and Antonio Francesco Gentile
Wireless Sensor Networks (WSNs) are networks of small devices with limited resources which are able to collect different information for a variety of purposes. Energy and security play a key role in these networks and MAC aspects are fundamental in their...
ver más
|
|
|
|
|
|
|
Jin-Bo Wang, You Wu and Yu Zhou
Maximum distance separable (MDS) codes have the maximum branch number in cryptography, and they are generally used in diffusion layers of symmetric ciphers. The diffusion layer of the Advanced Encryption Standard (AES) uses the circulant MDS matrix with ...
ver más
|
|
|
|
|
|
|
Ping Pan, Junzhi Ye, Yun Pan, Lize Gu and Licheng Wang
Commitment schemes are important tools in cryptography and used as building blocks in many cryptographic protocols. We propose two commitment schemes by using Rubik?s groups. Our proposals do not lay the security on the taken-for-granted hardness of the ...
ver más
|
|
|
|
|
|
|
Haotian Liang, Guidong Zhang, Wenjin Hou, Pinyi Huang, Bo Liu and Shouliang Li
Most of the image encryption schemes based on chaos have so far employed symmetric key cryptography, which leads to a situation where the key cannot be transmitted in public channels, thus limiting their extended application. Based on the elliptic curve ...
ver más
|
|
|
|
|
|
|
Eiman ElGhanam, Ibtihal Ahmed, Mohamed Hassan and Ahmed Osman
Dynamic wireless charging (DWC) is a promising technology to charge Electric Vehicles (EV) using on-road charging segments (CS), also known as DWC pads. In order to ensure effective utilization of this on-the-road charging service, communication and coor...
ver más
|
|
|
|
|
|
|
Anindya Dwi Putri Islamidina, Amang Sudarsono, Titon Dutono
Pág. 102 - 125
Nowadays traveling is the activity that everyone likes the most, but sometimes there is one traveling member who is lost and confused looking for the location of the other members. When traveling, they must bring a smartphone because of its small size an...
ver más
|
|
|
|
|
|
|
Alla Gavrilova,Ihor Volkov,Yuliia Kozhedub,Roman Korolev,Oleksandr Lezik,Volodymyr Medvediev,Oleksandr Milov,Bogdan Tomashevsky,Andrii Trystan,Oksana Chekunova
Pág. 45 - 63
The development of computer technology has determined the vector for the expansion of services based on the Internet and ?G? technologies. The main requirements for modern services in the banking sector are security and reliability. At the same time, sec...
ver más
|
|
|
|