Blockchain-Based Implementation of National Census as a Supplementary Instrument for Enhanced Transparency, Accountability, Privacy, and Security

S Rasheed, S Louca - Future Internet, 2024 - mdpi.com
A national population census is instrumental in offering a holistic view of a country's
progress, directly influencing policy formulation and strategic planning. Potential flaws in the …

[HTML][HTML] Dracon: An open-hardware based platform for single-chip low-cost reconfigurable IoT Devices

L Parrilla, A García, E Castillo, JA Álvarez-Bermejo… - Electronics, 2022 - mdpi.com
The development of devices for the Internet of Things (IoT) requires the rapid prototy** of
different hardware configurations. In this paper, a modular hardware platform allowing to …

Security Defense of Large-Scale Networks Under False Data Injection Attacks: An Attack Detection Scheduling Approach

Y Suo, S Chai, R Chai, ZH Pang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In large-scale networks, communication links between nodes are easily injected with false
data by adversaries. This paper proposes a novel security defense strategy from the …

[PDF][PDF] Security analysis for SCKHA algorithm: stream cipher algorithm based on key hashing technique

S Souror, N El-Fishawy, M Badawy - Chin J Electron, 2022 - researchgate.net
The strength of any cryptographic algorithm is mostly based on the difficulty of its encryption
key. However, the larger size of the shared key the more computational operations and …

A Usable Encryption Solution for File-Based Geospatial Data within a Database File System

P Sharma, M Govorov, M Martin - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
Develo** a security solution for spatial files within today's enterprise Geographical
Information System (GIS) that is also usable presents a multifaceted challenge. These files …

Blockchain-Based Authenticated Stego-Channels and Application to Ethereum

V Kanth, B Hale - IEEE Transactions on Dependable and …, 2024 - ieeexplore.ieee.org
Given their usefulness for evading traceability in networks, it is not surprising that
steganographic techniques continue in the modern era and have been looked at through the …

SISS‐CSA: Secret image sharing scheme with ciphertext‐based share authentication for malicious model

K Bhat, DC **wala, Y Prasad… - Software: Practice and …, 2024 - Wiley Online Library
We propose a novel secret image sharing scheme with ciphertext‐based share
authentication (SISS‐CSA) for sharing grayscale and color secret images in the malicious …

A comparative analysis of the impact of cryptography in IoT lora applications

I Lino, J Cecílio - 2022 IEEE 20th International Conference on …, 2022 - ieeexplore.ieee.org
The Internet of Things has been applied in different application contexts, ranging from
industrial, healthcare or simple home life applications. It allows adding a new level of …

Enhancing the Security of ISO/IEC 14443-3 and 4 RFID Authentication Protocols through Formal Analysis

L Pankaczi, M Eldefrawy - 2023 IEEE International Conference …, 2023 - ieeexplore.ieee.org
Due to cyber attacks targeting RFID systems, this paper briefly summarizes parts 3 and 4 of
the ISO/IEC 14443 standard, which specify the initialization, selection, and trans-mission …

Dynamic sliding window encoding for data storage on DNA under biological and indexing constraints

C Berton, G Coatrieux, D Lavenier… - 2023 31st European …, 2023 - ieeexplore.ieee.org
In this paper, we propose a first dynamic sliding window encoding (DSWE) for storing
encrypted data in a DNA form taking into account biological constraints and prohibited …