Buscar
Mostrando ítems 1-10 de 28
Clustering based physical-layer authentication in edge computing systems with asymmetric resources
(MDPI AG, 2019)
In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcome the drawback of traditional cipher-based authentication schemes that suffer from heavy costs and are limited by ...
Deep-learning-based physical layer authentication for industrial wireless sensor networks
(MDPI AG, 2019)
In this paper, a deep learning (DL)-based physical (PHY) layer authentication framework is proposed to enhance the security of industrial wireless sensor networks (IWSNs). Three algorithms, the deep neural network (DNN)-based ...
Puf-based Mutual Multifactor Entity And Transaction Authentication For Secure Banking
(Springer Int Publishing AGCham, 2016)
Puf-based Mutual Multifactor Entity And Transaction Authentication For Secure Banking
(SPRINGER INT PUBLISHING AGCHAM, 2016)
FLAT: Federated Lightweight Authentication of Things
(Universidade Federal de Minas GeraisUFMG, 2018-07-13)
The Internet of Things (IoT) applications and technologies have been modifying the way people and businesses interact. The IoT growth, however, is followed by several challenges. Among them, a critical aspect in IoT is the ...
Revisiting the Security of the ALRED Design and Two of Its Variants: Marvin and LetterSoup
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCPISCATAWAY, 2012)
The ALRED construction is a lightweight strategy for constructing message authentication algorithms from an underlying iterated block cipher. Even though this construction's original analyses show that it is secure against ...
A Lightweight Cryptographic Scheme to Provide Confidentiality and Integrity in a UAVs Swarm Centralized Architecture
(Instituto Nacional de Astrofísica, Óptica y Electrónica., 2022)
Análise da integração entre o Kerberos e o OpenLDAP
(Universidade Tecnológica Federal do ParanáCampo Mourao, 2013-05-03)
Due to the difficulty of managing users in different services of computer network, today there is a tendency to centralize data via LDAP (Lightweight Directory Access Protocol). However, computer networks are not secure, ...