Buscar
Mostrando ítems 1-9 de 9
Clustering based physical-layer authentication in edge computing systems with asymmetric resources
(MDPI AG, 2019)
In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcome the drawback of traditional cipher-based authentication schemes that suffer from heavy costs and are limited by ...
PCHET: An efficient programmable cellular automata based hybrid encryption technique for multi-chat client-server applications
This paper demonstrates an efficient programmable Cellular Automata (CA) based hybrid encryption technique (PCHET) for chatting applications involving multiple clients who can chat simultaneously with each other. The ...
Secure and efficient transmission of data based on Caesar Cipher Algorithm for Sybil attack in IoT
The Internet of Things (IoT) is an emerging concept in the field of information technology. IoT can integrate any real-time entity with another, using sensing, computing and communication capabilities to offer enhanced ...
Revisiting the Security of the ALRED Design and Two of Its Variants: Marvin and LetterSoup
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCPISCATAWAY, 2012)
The ALRED construction is a lightweight strategy for constructing message authentication algorithms from an underlying iterated block cipher. Even though this construction's original analyses show that it is secure against ...
Information security in WSN applied to smart metering networks based on cryptographic techniques
(Corporación Universidad de la Costa, 2021)