Zobrazeno 1 - 10
of 96
pro vyhledávání: '"Junji SHIKATA"'
Publikováno v:
IEEE Access, Vol 11, Pp 62955-62969 (2023)
We consider a basic system to securely and remotely control many IoT devices. Specifically, we require that: 1) a system manager broadcasts information to IoT devices, e.g., wireless environment, only the designated devices can identify operations se
Externí odkaz:
https://doaj.org/article/43ef327aa79b4f8484e3aed2df19c59c
Publikováno v:
Mathematics, Vol 12, Iss 6, p 835 (2024)
The advent of the Internet of Things brought a new age of interconnected device functionality, ranging from personal devices and smart houses to industrial control systems. However, increased security risks have emerged in its wake, in particular sel
Externí odkaz:
https://doaj.org/article/2951208eb1f644e89436b24d090e88cb
Publikováno v:
IEEE Access, Vol 10, Pp 47805-47813 (2022)
In this paper, we investigate the impact of a bit-labeling scheme on security performance of bit-interleaved coded modulation (BICM) systems for the Gaussian wiretap channel, where the concept of security gap plays an important role. To exemplify thi
Externí odkaz:
https://doaj.org/article/ce6099b75df94e3a8ce385e01e46e51c
Autor:
Shoichi Hirose, Junji Shikata
Publikováno v:
IEEE Access, Vol 8, Pp 216116-216126 (2020)
We introduce group-testing aggregate message authentication code (GTA MAC) and provide its formal study. We first specify its syntax and security requirements. Then, we present a scheme of generic construction which applies non-adaptive group-testing
Externí odkaz:
https://doaj.org/article/a55147a846ae4c54b00972452750865c
Publikováno v:
Entropy, Vol 20, Iss 10, p 729 (2018)
Many cryptographic systems require random numbers, and the use of weak random numbers leads to insecure systems. In the modern world, there are several techniques for generating random numbers, of which the most fundamental and important methods are
Externí odkaz:
https://doaj.org/article/bda936f1b504410588b28b9adaa741ce
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :394-405
Publikováno v:
Designs, Codes and Cryptography.
Broadcast Encryption (BE) is public-key encryption allowing a sender to encrypt a message by specifing recipients, and only the specified recipients can decrypt the message. In several BE applications, since the privacy of recipients allowed to acces
Publikováno v:
2023 57th Annual Conference on Information Sciences and Systems (CISS).
Study of random propagation of malware in Internet-of-Things (IoT) networks. The study focuses on deriving exact mathematical models for the random propagation of malware using Markov chains and concepts of epidemic compartmental models.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7aa206d7d284782a2cd0003921891fa3
https://doi.org/10.36227/techrxiv.22047527
https://doi.org/10.36227/techrxiv.22047527
Publikováno v:
2023 IEEE Radio and Wireless Symposium (RWS).