Blockchain-Based Implementation of National Census as a Supplementary Instrument for Enhanced Transparency, Accountability, Privacy, and Security
S Rasheed, S Louca - Future Internet, 2024 - mdpi.com
A national population census is instrumental in offering a holistic view of a country's
progress, directly influencing policy formulation and strategic planning. Potential flaws in the …
progress, directly influencing policy formulation and strategic planning. Potential flaws in the …
[HTML][HTML] Dracon: An open-hardware based platform for single-chip low-cost reconfigurable IoT Devices
The development of devices for the Internet of Things (IoT) requires the rapid prototy** of
different hardware configurations. In this paper, a modular hardware platform allowing to …
different hardware configurations. In this paper, a modular hardware platform allowing to …
Security Defense of Large-Scale Networks Under False Data Injection Attacks: An Attack Detection Scheduling Approach
Y Suo, S Chai, R Chai, ZH Pang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In large-scale networks, communication links between nodes are easily injected with false
data by adversaries. This paper proposes a novel security defense strategy from the …
data by adversaries. This paper proposes a novel security defense strategy from the …
[PDF][PDF] Security analysis for SCKHA algorithm: stream cipher algorithm based on key hashing technique
The strength of any cryptographic algorithm is mostly based on the difficulty of its encryption
key. However, the larger size of the shared key the more computational operations and …
key. However, the larger size of the shared key the more computational operations and …
A Usable Encryption Solution for File-Based Geospatial Data within a Database File System
Develo** a security solution for spatial files within today's enterprise Geographical
Information System (GIS) that is also usable presents a multifaceted challenge. These files …
Information System (GIS) that is also usable presents a multifaceted challenge. These files …
Blockchain-Based Authenticated Stego-Channels and Application to Ethereum
V Kanth, B Hale - IEEE Transactions on Dependable and …, 2024 - ieeexplore.ieee.org
Given their usefulness for evading traceability in networks, it is not surprising that
steganographic techniques continue in the modern era and have been looked at through the …
steganographic techniques continue in the modern era and have been looked at through the …
SISS‐CSA: Secret image sharing scheme with ciphertext‐based share authentication for malicious model
We propose a novel secret image sharing scheme with ciphertext‐based share
authentication (SISS‐CSA) for sharing grayscale and color secret images in the malicious …
authentication (SISS‐CSA) for sharing grayscale and color secret images in the malicious …
A comparative analysis of the impact of cryptography in IoT lora applications
I Lino, J Cecílio - 2022 IEEE 20th International Conference on …, 2022 - ieeexplore.ieee.org
The Internet of Things has been applied in different application contexts, ranging from
industrial, healthcare or simple home life applications. It allows adding a new level of …
industrial, healthcare or simple home life applications. It allows adding a new level of …
Enhancing the Security of ISO/IEC 14443-3 and 4 RFID Authentication Protocols through Formal Analysis
L Pankaczi, M Eldefrawy - 2023 IEEE International Conference …, 2023 - ieeexplore.ieee.org
Due to cyber attacks targeting RFID systems, this paper briefly summarizes parts 3 and 4 of
the ISO/IEC 14443 standard, which specify the initialization, selection, and trans-mission …
the ISO/IEC 14443 standard, which specify the initialization, selection, and trans-mission …
Dynamic sliding window encoding for data storage on DNA under biological and indexing constraints
In this paper, we propose a first dynamic sliding window encoding (DSWE) for storing
encrypted data in a DNA form taking into account biological constraints and prohibited …
encrypted data in a DNA form taking into account biological constraints and prohibited …