19   Artículos

 
en línea
Ted H. Szymanski    
The next-generation ?Industrial Internet of Things? (IIoT) will support ?Machine-to-Machine? (M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and require guaranteed cyber-security. This paper explores hardware-enforced cyber-securi... ver más
Revista: Information    Formato: Electrónico

 
en línea
Alexandr Kuznetsov, Mikolaj Karpinski, Ruslana Ziubina, Sergey Kandiy, Emanuele Frontoni, Oleksandr Peliukh, Olga Veselska and Ruslan Kozak    
The problem of nonlinear substitution generation (S-boxes) is investigated in many related works in symmetric key cryptography. In particular, the strength of symmetric ciphers to linear cryptanalysis is directly related to the nonlinearity of substituti... ver más
Revista: Information    Formato: Electrónico

 
en línea
Mohammed El-hajj, Hussien Mousawi and Ahmad Fadlallah    
Highly constrained devices that are interconnected and interact to complete a task are being used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems, distributed control systems, vehicular systems, wireless sensor netw... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mauro Tropea, Mattia Giovanni Spina, Floriano De Rango and Antonio Francesco Gentile    
Wireless Sensor Networks (WSNs) are networks of small devices with limited resources which are able to collect different information for a variety of purposes. Energy and security play a key role in these networks and MAC aspects are fundamental in their... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jin-Bo Wang, You Wu and Yu Zhou    
Maximum distance separable (MDS) codes have the maximum branch number in cryptography, and they are generally used in diffusion layers of symmetric ciphers. The diffusion layer of the Advanced Encryption Standard (AES) uses the circulant MDS matrix with ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ping Pan, Junzhi Ye, Yun Pan, Lize Gu and Licheng Wang    
Commitment schemes are important tools in cryptography and used as building blocks in many cryptographic protocols. We propose two commitment schemes by using Rubik?s groups. Our proposals do not lay the security on the taken-for-granted hardness of the ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Haotian Liang, Guidong Zhang, Wenjin Hou, Pinyi Huang, Bo Liu and Shouliang Li    
Most of the image encryption schemes based on chaos have so far employed symmetric key cryptography, which leads to a situation where the key cannot be transmitted in public channels, thus limiting their extended application. Based on the elliptic curve ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Eiman ElGhanam, Ibtihal Ahmed, Mohamed Hassan and Ahmed Osman    
Dynamic wireless charging (DWC) is a promising technology to charge Electric Vehicles (EV) using on-road charging segments (CS), also known as DWC pads. In order to ensure effective utilization of this on-the-road charging service, communication and coor... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Anindya Dwi Putri Islamidina, Amang Sudarsono, Titon Dutono     Pág. 102 - 125
Nowadays traveling is the activity that everyone likes the most, but sometimes there is one traveling member who is lost and confused looking for the location of the other members. When traveling, they must bring a smartphone because of its small size an... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Alla Gavrilova,Ihor Volkov,Yuliia Kozhedub,Roman Korolev,Oleksandr Lezik,Volodymyr Medvediev,Oleksandr Milov,Bogdan Tomashevsky,Andrii Trystan,Oksana Chekunova     Pág. 45 - 63
The development of computer technology has determined the vector for the expansion of services based on the Internet and ?G? technologies. The main requirements for modern services in the banking sector are security and reliability. At the same time, sec... ver más
Revista: Eastern-European Journal of Enterprise Technologies    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »