Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Ruben De Smet"'
Publikováno v:
Sensors, Vol 24, Iss 17, p 5818 (2024)
Embedded Operating Systems (OSs) are often developed in the C programming language. Developers justify this choice by the performance that can be achieved, the low memory footprint, and the ease of mapping hardware to software, as well as the strong
Externí odkaz:
https://doaj.org/article/af2696a023994d5e863b18535d3902a9
Publikováno v:
Sensors, Vol 24, Iss 3, p 1030 (2024)
Elliptic curve cryptography is a widely deployed technology for securing digital communication. It is the basis of many cryptographic primitives such as key agreement protocols, digital signatures, and zero-knowledge proofs. Fast elliptic curve crypt
Externí odkaz:
https://doaj.org/article/ebe1eea7cc184e9bbbbe63918901819c
Autor:
Thibaut Vandervelden, Diana Deac, Roald Van Glabbeek, Ruben De Smet, An Braeken, Kris Steenhaut
Publikováno v:
Sensors, Vol 24, Iss 1, p 73 (2023)
The Internet of Things (IoT) facilitates the integration of diverse devices, leading to the formation of networks such as Low-power Wireless Personal Area Networks (LoWPANs). These networks have inherent constraints that make header and payload compr
Externí odkaz:
https://doaj.org/article/55d494787edf4a62b64fedbb95f35435
Autor:
Tom Godden, Ruben De Smet, Christophe Debruyne, Thibaut Vandervelden, Kris Steenhaut, An Braeken
Publikováno v:
IEEE Access, Vol 10, Pp 21384-21396 (2022)
Driven by the increased consciousness in data ownership and privacy, zero-knowledge proofs (ZKPs) have become a popular tool to convince a third party of the truthfulness of a statement without disclosing any further information. As ZKPs are rather c
Externí odkaz:
https://doaj.org/article/e066a60d8db64a7687a7201fd1fac281
Publikováno v:
Sensors, Vol 22, Iss 4, p 1403 (2022)
To enable today’s industrial automation, a significant number of sensors and actuators are required. In order to obtain trust and isolate faults in the data collected by this network, protection against authenticity fraud and nonrepudiation is esse
Externí odkaz:
https://doaj.org/article/ae8d0f342c014ad0b2a4996eb76040c0
Autor:
Christophe Debruyne, Kris Steenhaut, Thibaut Vandervelden, Ruben De Smet, An Braeken, Tom Godden
Publikováno v:
IEEE Access. 10:21384-21396
Driven by the increased consciousness in data ownership and privacy, zero-knowledge proofs (ZKPs) have become a popular tool to convince a third party of the truthfulness of a statement without disclosing any further information. As ZKPs are rather c
Publikováno v:
2022 IEEE 9th International Conference on e-Learning in Industrial Electronics (ICELIE).
We present our cloud-based software-as-a-service (SaaS) solution for educational purposes deployed within the Engineering faculity of our university. Its foundation is the open source Jupyter Notebook project with a web application providing an onlin
Autor:
Steffen Thielemans, Ruben De Smet, Priscilla Benedetti, Gianluca Reali, An Braeken, Kris Steenhaut
Publikováno v:
IECON 2022 – 48th Annual Conference of the IEEE Industrial Electronics Society.
When looking at cloud computing, aside from the commercial solutions like Amazon Web Services and Microsoft Azure, there are also promising open source alternatives. In this paper, our hands-on experiences are summarized with consuming, deploying and
Publikováno v:
Wireless Networks. 27:947-959
Fog computing improves efficiency and reduces the amount of bandwidth to the cloud. In many use cases, the internet of things (IoT) devices do not know the fog nodes in advance. Moreover, as the fog nodes are often placed in open publicly available p
In 2015, the National Institute of Standards and Technology (NIST) announced Keccak as the new primitive to be used in SHA 3, not replacing but complementing SHA 2. The Keccak primitive, based on a sponge construction, has flexible parameters that ca
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::579a337f8a17a119acd7b5f68aa0e7ac
https://biblio.vub.ac.be/vubir/sha-3-and-keccak-variants-computation-speeds-on-constrained-devices(eb1a01df-76db-4899-95ef-bc58c256a58a).html
https://biblio.vub.ac.be/vubir/sha-3-and-keccak-variants-computation-speeds-on-constrained-devices(eb1a01df-76db-4899-95ef-bc58c256a58a).html