Zobrazeno 1 - 10
of 10 752
pro vyhledávání: '"Security analysis"'
Publikováno v:
AIMS Mathematics, Vol 9, Iss 10, Pp 26961-26982 (2024)
In this paper, we revisited the previously proposed key exchange protocol based on the matrix power function. We prove that the entries of the public key matrices of both parties of the protocol are uniform. Using this result we defined a security ga
Externí odkaz:
https://doaj.org/article/926cb3ebed47472093f5c1f4675274de
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-13 (2024)
Abstract This study focuses on the design and preparation of a thin-walled plastic chair, and its mechanical properties were investigated by high load, cyclic load and drop impact. The finite element method (FEM) was employed to accurately evaluate t
Externí odkaz:
https://doaj.org/article/189ae1cdcf9843a08594022f2979b14c
Publikováno v:
Complex & Intelligent Systems, Vol 10, Iss 5, Pp 6597-6618 (2024)
Abstract As an emerging wireless communication technology, narrowband Internet of Things is widely used in various scenarios, but it also brings new security problems, especially the group authentication between terminal devices and servers. In narro
Externí odkaz:
https://doaj.org/article/797694e9425841bc9a77fd9e8ab6f2a8
Publikováno v:
Фінансово-кредитні системи: перспективи розвитку., Vol 2, Iss 13, Pp 57-67 (2024)
The system of guaranteeing the financial institutions security has been improved. Security management of a financial institution is the influence of management on the institution's activities in order to ensure security - such a state of the institut
Externí odkaz:
https://doaj.org/article/df204ff67a0a4972b8c21b729c842b65
Publikováno v:
Ilkom Jurnal Ilmiah, Vol 16, Iss 1, Pp 12-26 (2024)
The advent of container technology has emerged as a pivotal solution for application developers, addressing concerns regarding the seamless execution of developed applications during the deployment process. Various low-level container runtimes, inclu
Externí odkaz:
https://doaj.org/article/24a93b4b63884d27a39205f95449d161
Publikováno v:
Jurnal Saintekom, Vol 14, Iss 1, Pp 72-83 (2024)
This research evaluates the cybersecurity maturity of a technology information company in Jakarta, using the CIS Controls framework that encompasses all controls within Implementation Group 1 (IG1). The company has not conducted formal measurements r
Externí odkaz:
https://doaj.org/article/361eb460c84d488f9581fc6e79e01a3b
Autor:
Roayat Ismail Abdelfatah
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 5, Pp 102062- (2024)
A significant problem facing cybersecurity is that most client/server identity authentication schemes depend on computational complexity which is recently challenged by the super exponential computational abilities of quantum computers. Quantum crypt
Externí odkaz:
https://doaj.org/article/75ad54bfee334c7788eae210246b9878
Publikováno v:
IEEE Access, Vol 12, Pp 173670-173685 (2024)
Transport Layer Security (TLS) is a widely used protocol for secure channel establishment. However, TLS lacks any inherent mechanism for validating the security state of the endpoint software and its platform. To overcome this limitation, recent work
Externí odkaz:
https://doaj.org/article/3e1b0a5e75d840068630b67fbbfc83fb
Autor:
A. M. Konakov, A. G. Pevneva
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 50, Iss 4, Pp 109-114 (2024)
Objective. The purpose of the study is the functionality of designing, building and implementing protection systems taking into account the time factor. Method. The analysis of the functional interaction of the construction of three sequentially inte
Externí odkaz:
https://doaj.org/article/98b1da2f73a444abac56810e40a67c01
Autor:
Manuel Alejandro Cardona-Lopez, Rolando Flores-Carapia, Victor Manuel Silva-Garcia, Eduardo Vega-Alvarado, Marlon David Gonzalez-Ramirez
Publikováno v:
IEEE Access, Vol 12, Pp 81506-81517 (2024)
In this work, a proposal to quantify the security gap between Encryption-then-Compression (EtC) systems and the Substitution-Permutation Network (SPN) is presented. A new image transmission system for JPEG files, EtC with Quantization before Transfor
Externí odkaz:
https://doaj.org/article/4d5012ddac1a4e3cb347860dc7b900e9