Zobrazeno 1 - 10
of 66
pro vyhledávání: '"Wael Adi"'
Publikováno v:
Cryptography, Vol 5, Iss 4, p 32 (2021)
Internet of things (IoT) technologies have recently gained much interest from numerous industries, where devices, machines, sensors, or simply things are linked with each other over open communication networks. However, such an operation environment
Externí odkaz:
https://doaj.org/article/a6289d363639480cb0a8000811ab2775
Publikováno v:
Cryptography, Vol 4, Iss 3, p 19 (2020)
Telemedicine applications are more and more used due to the rapid development of digital imaging and information and communication technologies. Medical information which include digital medical images and patient’s information are extracted and tr
Externí odkaz:
https://doaj.org/article/97e4e95a3a60454382b24f1c4b4b0945
Low-Complexity Nonlinear Self-Inverse Permutation for Creating Physically Clone-Resistant Identities
Publikováno v:
Cryptography, Vol 4, Iss 1, p 6 (2020)
New large classes of permutations over based on T-Functions as Self-Inverting Permutation Functions (SIPFs) are presented. The presented classes exhibit negligible or low complexity when implemented in emerging FPGA technologies. The target use of su
Externí odkaz:
https://doaj.org/article/5448732ce80042a48af8d702361b2e18
Publikováno v:
Cryptography, Vol 4, Iss 1, p 1 (2019)
Fleet Management (FM) deals with the management of transport, distribution, and logistics of national and international goods exchange, in which many operators worldwide are involved. Fleet management involves many security-relevant participating ent
Externí odkaz:
https://doaj.org/article/901c942e9fde4c38b7f4dff4762e47f5
Autor:
Ayoub Mars, Wael Adi
Publikováno v:
Cryptography, Vol 3, Iss 2, p 11 (2019)
A concept for creating a large class of lightweight stream ciphers as Key Stream Generators KSGs is presented. The resulting class-size exceeds 2323 possible different KSGs. If one unknown cipher from the KSG-class is randomly picked-up and stored ir
Externí odkaz:
https://doaj.org/article/479dca47aa034824bfc96b49aa5ed991
Publikováno v:
Cryptography
Volume 5
Issue 4
Cryptography, Vol 5, Iss 32, p 32 (2021)
Volume 5
Issue 4
Cryptography, Vol 5, Iss 32, p 32 (2021)
Internet of things (IoT) technologies have recently gained much interest from numerous industries, where devices, machines, sensors, or simply things are linked with each other over open communication networks. However, such an operation environment
Autor:
Wael Adi, Emad Hamadaqa
Publikováno v:
2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4).
This work aims to improve security performance in the future Internet of Medical Things (IoMT) on open networks by embedding stable clone-resistant physical identities in all relevant medical entities. A hard-wired digital clone resistant identity re
Publikováno v:
Cryptography, Vol 4, Iss 19, p 19 (2020)
Cryptography
Volume 4
Issue 3
Cryptography
Volume 4
Issue 3
Telemedicine applications are more and more used due to the rapid development of digital imaging and information and communication technologies. Medical information which include digital medical images and patient&rsquo
s information are extract
s information are extract
Publikováno v:
Cryptography, Vol 4, Iss 1, p 1 (2019)
Cryptography
Volume 4
Issue 1
Cryptography
Volume 4
Issue 1
Fleet Management (FM) deals with the management of transport, distribution, and logistics of national and international goods exchange, in which many operators worldwide are involved. Fleet management involves many security-relevant participating ent
Publikováno v:
2019 International Conference on Cyber Security for Emerging Technologies (CSET).
The emerging network technologies are deploying powerful smart-devices and at the same time result with more open environment operational threats. The need for a highly secure robust biology-like device identity is growing day after day. In particula