Buscar
Mostrando ítems 1-10 de 415
Mining Cryptography Misuse In Online Forums
(IEEE Computer SocLos Alamitos, 2016)
Genetic Operators Applied to Symmetric Cryptography
In this article, a symmetric-key cryptographic algorithm for text is proposed, which applies Genetic Algorithms philosophy, entropy and modular arithmetic. An experimental methodology is used over a deterministic system, ...
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
(Elsevier Science BvAmsterdamHolanda, 2011)
TD2SecIoT: Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT
The Internet of Things (IoT) is an emerging technology, which comprises wireless smart sensors and actuators. Nowadays, IoT is implemented in different areas such as Smart Homes, Smart Cities, Smart Industries, Military, ...
Embedding Elliptic Curve Cryptography and Twofish Algorithm to Improve Data Security in Internet of Things
(Universidad Nacional de UcayaliPE, 2021)
The implicit idea of the IoT is to follow client's identity effectively, so the security and protection concerns like theft the information and disturbance of tasks are turning out to be basic issues in the present IoT ...
An IND-CCA Rank Metric Encryption Scheme Implementation
(Florianópolis, SC., 2022)
Biometry, the safe key
Biometry is the next step in authentication, why do not
we take this stepforward in our communication security systems?
Keys are the main disadvantage in the cryptography, what if we
were our own key?