Browsing by Subject "Cryptography"
Now showing items 1-20 of 21
-
A 2.45GHz power harvesting circuit in 90nm CMOS
(2010)In this work, an overview of the state-of-the-art of the design techniques of power harvesting (rectifYing) circuits is presented. The evolution of each circuit, the advantages and design constraints, are investigated and ... -
A Blockchained Secure and Integrity-Preserved Architecture for Military Logistics Operations
(2022)The employment of 5G Internet of Things (5G-IoT), smart automation, and AI analytics can provide improved military logistics, by enhancing inventory control, reordering, accuracy, flexibility mobility, and real-time ... -
A distributed biometric authentication scheme based on blockchain
(2020)Biometric authentication is the preferred authentication scheme in modern computing systems. While it offers enhanced usability, it also requires cautious handling of sensitive users' biometric templates. In this paper, a ... -
Employing blockchain and physical unclonable functions for counterfeit IoT devices detection
(2019)Counterfeit copycat devices have become one of the most important problems in IoT ecosystem. The number of IoT devices manufactured has grown exponentially through last years. In order to be competitive in terms of production ... -
Federated Blockchained Supply Chain Management: A CyberSecurity and Privacy Framework
(2021)The complete transformation of the supply chain in a truly integrated and fully automated process, presupposes the continuous and endless collection of digital information from every stage of the production scale. The aim ... -
A framework for secure data delivery in wireless sensor networks
(2012)Typical sensor nodes are resource constrained devices containing user level applications, operating system components, and device drivers in a single address space, with no form of memory protection. A malicious user could ... -
Implementation and performance analysis of SEAL encryption on FPGA, GPU and multi-core processors
(2011)Accelerators, such as field programmable gate arrays (FPGAs) and graphics processing units (GPUs), are special purpose processors designed to speed up compute-intensive sections of applications. FPGAs are highly customizable, ... -
iMuse Mobile Tour: A personalized multimedia museum guide opens to groups
(2011)In the recent years, there is a growing interest in exploiting the advances of mobile and pervasive computing to museum environments. A mobile museum guide, named iMuse Mobile Tour is presented in this paper. The guide ... -
Low power monolithic 3D IC design of asynchronous AES core
(2015)In this paper, we demonstrate, for the first time, that a monolithic 3D implementation of an asynchronous AES encryption core can achieve up to 50.3% footprint reduction, 25.7% improvement in power, 34.3% shorter wirelength ... -
Machine learning for all: A more robust federated learning framework
(2019)Machine learning and especially deep learning are appropriate for solving multiple problems in various domains. Training such models though, demands significant processing power and requires large data-sets. Federated ... -
The next generation cognitive security operations center: Network flow forensics using cybersecurity intelligence
(2018)A Security Operations Center (SOC) can be defined as an organized and highly skilled team that uses advanced computer forensics tools to prevent, detect and respond to cybersecurity incidents of an organization. The ... -
An open web services - Based framework for data mining of biomedical image data
(2009)Mining of biomedical image data is a complex procedure that requires several processing phases, such as data acquisition, preprocessing (e.g., image enhancement, color processing), feature extraction and classification. ... -
A performance enhancement approach based on tweak process scheduling for a P1619 core
(2016)The IEEE P1619 standard was developed to protect data in shared storage media. Most of the works that have been presented until now have adopted a no robust scheduling scheme to implement various architectures. At first, ... -
Privacy preserving platform for profitable mobile crowd sensing and users' adoption
(2017)Mobile crowd sensing enables users to collaborate in terms of data collection. In practice, end users collect data through their smart devices and then share it with other users, who .nd it useful. A data request consists ... -
Privacy preserving record linkage approaches
(2009)Privacy-preserving record linkage is a very important task, mostly because of the very sensitive nature of the personal data. The main focus in this task is to find a way to match records from among different organisation ... -
Secure aggregation of users' privacy preferences in shared IoT environments
(2021)Internet of Things (IoT) technology has emerged as a core aspect of everyday life, since the number of deployed devices increases exponentially day by day. IoT offers the automation of many actions and strengthens the ... -
Security and Privacy Concerns for Healthcare Wearable Devices and Emerging Alternative Approaches
(2022)The wide use of wearable devices rises a lot of concerns about the privacy and security of personal data that are collected and stored by such services. This concern is even higher when such data is produced by healthcare ... -
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
(2018)This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G cellular ... -
Security Revisited: Honeytokens meet Google Authenticator
(2022)In contrast to the rapid advancement and evolution of technology, computer systems rely significantly on passwords to maintain their security for an unreasonably long time. Although the introduction of two or more factors ... -
Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts
(2021)Cyber-security attacks are becoming more frequent and more severe day by day. To detect the execution of such attacks, organizations install intrusion detection systems. It would be beneficial for such organizations to ...