Buscar
Mostrando ítems 1-10 de 35
Elliptic curve algorithms for a new PKI Hierarchy in the Peruvian State
(Institute of Electrical and Electronics Engineers Inc.PE, 2021-09-21)
In this paper we determine the elliptic curve algorithms with its respective parameters and technical specifications for a new PKI (Public Key Infrastructure) hierarchy in the Peruvian state considering the following ...
Building a threshold cryptographic distributed HSM with docker containers
(IEEE, 2017)
The Domain Name System (DNS) has evolved
to support the exponential growth of the Internet, by
relying heavily on a highly distributed infrastructure.
Nevertheless, trust between server must exist in order to
guarantee ...
Módulos del núcleo de linux para el servicio de anonimato en dispositivos android
(2018-12-04)
RESUMEN:
Los módulos en el núcleo de Linux, permiten agregar funcionalidades a un sistema sin afectar su rendimiento. Dichos módulos, se ejecutan en espacio de núcleo y pueden ser utilizados por las diferentes aplicaciones ...
Uma API criptográfica para aplicações embarcadas
(Universidade Tecnológica Federal do ParanáCuritibaBrasilPrograma de Pós-Graduação em Computação AplicadaUTFPR, 2016-08-31)
This document presents GEmSysC, an unified cryptographic API for embedded systems. Software layers implementing this API can be built over existing libraries, allowing embedded software to access cryptographic functions ...
Desenvolvimento de um mecanismo de proteção contra a instalação de módulos maliciosos no kernel Linux baseado em syscall hooks.
(Universidade Federal de São CarlosUFSCarCâmpus São CarlosEngenharia de Computação - EC, 2022-09-15)
Even though the Linux kernel is categorized as being monolithic, it has the capability of extending its functionalities by adding code through modules that are added during runtime. Due to its importance, Linux is a ...
A quantum-resistant advanced metering infrastructure
(Universidade Federal de Juiz de Fora (UFJF)BrasilFaculdade de EngenhariaPrograma de Pós-graduação em Engenharia ElétricaUFJF, 2023)
Spectral shuffling with phase encoding and dynamic keys applied to transparent optical network signals
(2020-07-01)
A recently proposed signal encryption technique consists in shuffling the samples of two or more baseband signals, which are then modulated in different optical carriers and transmitted by transparent optical networks. In ...
Spectral Shuffling with Phase Encoding and Dynamic Keys Applied to Transparent Optical Network Signals
(Ieee, 2020-01-01)
A recently proposed signal encryption technique consists in shuffling the samples of two or more baseband signals, which are then modulated in different optical carriers and transmitted by transparent optical networks. In ...