Zobrazeno 1 - 10
of 116
pro vyhledávání: '"Basel Halak"'
Autor:
Basel Halak, Thomas Gibson, Millicent Henley, Cristin-Bianca Botea, Benjamin Heath, Sayedur Khan
Publikováno v:
IEEE Access, Vol 12, Pp 8791-8805 (2024)
The accelerated development of quantum computers poses a direct threat to all current standards of public key encryption, for example, the Shor algorithm exploits the superposition state of the qubits to solve the problem of integer factorization in
Externí odkaz:
https://doaj.org/article/a4f7843fb89f4517ae69cd98da48e5cb
Publikováno v:
Scientific Reports, Vol 13, Iss 1, Pp 1-9 (2023)
Abstract The modern IC supply chain encompasses a large number of steps and manufacturers. In many applications it is critically important that chips are of the right quality and are assured to have been obtained from the legitimate supply chain. To
Externí odkaz:
https://doaj.org/article/464f12c0690e416ab9b5413dfe1e8ebe
Publikováno v:
IEEE Access, Vol 10, Pp 76707-76719 (2022)
Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies. Recent developments in the field of quantum computation have placed the
Externí odkaz:
https://doaj.org/article/0fd829e74323494bbfb2b9a25da6ca3a
Autor:
Basel Halak, Christian Hall, Syed Fathir, Nelson Kit, Ruwaydah Raymode, Michael Gimson, Ahmad Kida, Hugo Vincent
Publikováno v:
IEEE Access, Vol 10, Pp 55369-55380 (2022)
The sheer increase in interconnected devices, reaching 50 B in 2025, makes it easier for adversaries to have direct access to the target system and perform physical attacks. This risk is exacerbated by the proliferation of Internet-of-Battlefield Thi
Externí odkaz:
https://doaj.org/article/46213e42357f49cfbd42f4482493e098
Publikováno v:
IEEE Access, Vol 10, Pp 118522-118522 (2022)
In the above article [1], in the discussions section it is stated “However, there are still challenges related to the scalability and key distribution problem that need to be addressed before symmetric key solutions can be adopted.” The authors w
Externí odkaz:
https://doaj.org/article/1e9f766e2b7342d2bef09cd7b709f9e4
Autor:
Robert Cockell, Basel Halak
Publikováno v:
Cryptography, Vol 4, Iss 2, p 12 (2020)
This paper proposes a portable hardware token for user’s authentication; it is based on the use of keystroke dynamics to verify users biometrically. The proposed approach allows for a multifactor authentication scheme, in which a user cannot be gra
Externí odkaz:
https://doaj.org/article/a720ceed11644bcc987581b255f8396f
Autor:
Jorge Rivadeneira, Basel Halak
Publikováno v:
Maskana, Vol 8 (2017)
RESUMEN Proteger la información es un requisito fundamental para preservar su confidencialidad e integridad. El uso de criptografía y esteganografía, más que un simple compendio de técnicas y algoritmos, se ha convertido en una necesidad urgent
Externí odkaz:
https://doaj.org/article/aa2dd47477b74130beaf95ada054d51a
Autor:
Tom Eccles, Basel Halak
Publikováno v:
Cryptography, Vol 1, Iss 3, p 20 (2017)
Traditional utility metering is to be replaced by smart metering. Smart metering enables fine-grained utility consumption measurements. These fine-grained measurements raise privacy concerns due to the lifestyle information which can be inferred from
Externí odkaz:
https://doaj.org/article/7aa5fb61451f446faca4c95caa05740a
Publikováno v:
Journal of Low Power Electronics and Applications, Vol 6, Iss 3, p 12 (2016)
Energy efficiency is a primary design goal for future green wireless communication technologies. Multiple-input multiple-output (MIMO) schemes have been proposed in the literature to improve the throughput of communication systems, and they are expec
Externí odkaz:
https://doaj.org/article/bd8c75e0f82044d59e1c682f6e8ecced
Autor:
Haoyu Wang, Basel Halak
Publikováno v:
Proceedings of the 28th Asia and South Pacific Design Automation Conference.