Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Duane Booher"'
Autor:
Bertrand Cambou, Michael Gowanlock, Julie Heynssens, Saloni Jain, Christopher Philabaum, Duane Booher, Ian Burke, Jack Garrard, Donald Telesca, Laurent Njilla
Publikováno v:
Cryptography, Vol 4, Iss 2, p 17 (2020)
Blockchain technology is a game-changing, enhancing security for the supply chain of smart additive manufacturing. Blockchain enables the tracking and recording of the history of each transaction in a ledger stored in the cloud that cannot be altered
Externí odkaz:
https://doaj.org/article/672f6431ace04e73af496fe0e9e0f928
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9783031104664
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::86f588bc520cb674b9e5de3cb2dd0766
https://doi.org/10.1007/978-3-031-10467-1_36
https://doi.org/10.1007/978-3-031-10467-1_36
Autor:
Ian Burke, Jack Garrard, Julie Heynssens, Michael Gowanlock, Laurent Njilla, Saloni Jain, Donald Telesca, Duane Booher, Christopher Philabaum, Bertrand Cambou
Publikováno v:
Cryptography
Volume 4
Issue 2
Cryptography, Vol 4, Iss 17, p 17 (2020)
Volume 4
Issue 2
Cryptography, Vol 4, Iss 17, p 17 (2020)
Blockchain technology is a game-changing, enhancing security for the supply chain of smart additive manufacturing. Blockchain enables the tracking and recording of the history of each transaction in a ledger stored in the cloud that cannot be altered
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030522421
SAI (3)
SAI (3)
Physical unclonable functions are not easy to integrate into cryptographic systems because they age, and are sensitive to environmental interferences. Excellent error correcting schemes were developed to handle such drifts, however the computing powe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f7312acc373487bd71dae87ac430937c
https://doi.org/10.1007/978-3-030-52243-8_22
https://doi.org/10.1007/978-3-030-52243-8_22
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030522421
SAI (3)
SAI (3)
The main goal of narrating the password-management protocol is to reduce the prevalent attacks on cyber-physical systems such as the hacking of databases of User-ID-Password pairs and side-channel analysis. The architecture uses a hash function to ha
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e27de01c32169aabe37e1f9890d0552a
https://doi.org/10.1007/978-3-030-52243-8_26
https://doi.org/10.1007/978-3-030-52243-8_26
Autor:
Bertrand Cambou, Mohammad Mohammadinodoushan, David Hely, Christopher Philabaum, Duane Booher
Publikováno v:
2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)
2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), Jun 2019, Boston, France. pp.1-8, ⟨10.1109/SAHCN.2019.8824792⟩
SECON
2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), Jun 2019, Boston, France. pp.1-8, ⟨10.1109/SAHCN.2019.8824792⟩
SECON
One of the crucial cyber-attacks which has been reported is hacking the databases of users’ identification and passwords. Surprisingly, the typical procedure in most networks is the saving of passwords or password hashes in the look-up tables, whic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2c6fcecc69561ebe9deab4d865c0852f
https://hal.archives-ouvertes.fr/hal-02296576
https://hal.archives-ouvertes.fr/hal-02296576
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9783030123840
Physical Unclonable Functions (PUFs) are used as hardware fingerprints for access control, and authentication in mobile and wireless networks and Internet of Things. However, it is challenging to use PUFs to extract cryptographic keys, because a sing
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3e02b0a9b22ce8fda55ff749a4fb3566
https://doi.org/10.1007/978-3-030-12385-7_55
https://doi.org/10.1007/978-3-030-12385-7_55
Autor:
Mohammad Mohammadinodoushan, Bertrand Cambou, Duane Booher, Dina Ghanai Miandoab, Sareh Assiri
Publikováno v:
CCWC
This paper presents how the security of key distribution protocols can be enhanced using the ternary arithmetic conversion, along with shared keys between communicating parties. It is shown that both the transmitting and the receiving party can calcu
Publikováno v:
CNS
The objective of the PKA encryption scheme is to complement, or replace, existing Public Key Infrastructures (PKI) [1]. In this scheme, the initialization step is based on the secure exchange of addressable cryptographic tables between the communicat