Embedded designers are forced to find new design solutions for fast growing embedded systems due to technological improvements. Despite Radio Frequency Identification (RFID) technology makes the lives of users easier, it also brings... more
ASIC-oriented comparative review of hardware security algorithms for internet of things applications
Research into the security of the Internet of Things (IoT) needs to utilize particular algorithms that offer ultra-low power consumption and a long lifespan, along with other parameters such as strong immunity against attacks, lower chip... more
Local pseudorandom generators are a class of fundamental cryptographic primitives having very broad applications in theoretical cryptography. Following Couteau et al.'s work in ASIACRYPT 2018, this paper further studies the concrete... more
Outsourcing data to remote cloud providers is becoming increasingly popular amongst organizations and individuals. A semi-trusted server uses Searchable Symmetric Encryption (SSE) to keep the search information under acceptable leakage... more
Ant colony optimization (ACO) has widely been applied to solve combinatorial optimization problems in recent years. There are few studies, however, on its convergence time, which re?ects how many iteration times ACO algorithms spend in... more
Mobile cloud computing augments the resource-constrained mobile devices to run rich mobile applications by leveraging the cloud resources and services. Compute-intensive mobile apps require significant communication resources for... more
Today, all types of digital signature schemes emphasis on secure and best verification methods. Different digital signature schemes are used in order for the websites, security organizations, banks and so on to verify user's validity.... more
The increase of the capacity of processing units and the growth of distributed computing make easy to collect and process information of Internet traffic flows. This information, however, can be used to perform attacks in anonymous... more
In order to effectively manage network resources and to serve different traffic needs, several works have been done in the QoS area. Basically, "Multi-Field (MF) packet classifiers" classify a packet by looking for multiple fields of the... more
Improving software algorithms are not easy task, especially for increasing operating speed, and reducing complexity. Different algorithms implemented in cryptosystems used the exponentiation modular arithmetic, however, they suffer very... more
Extracting minutia and other features from fingerprint images is one of the most important steps in automatic fingerprint identification and classification. This paper proposes a method for the generation of long and secure code that may... more
This paper presents an approach to cryptanalysis of RSA cryptosystem based on the application of genetic algorithm. The search utilizes the idea of timing attack as computation time information may leak due to different modular operations... more
The parallel division algorithms discussed in this paper may be classified among modified higher radix nonrestoring on-line division methods, where redundant representations are extensively utilized to speed up the operation. The network... more
The essay, published by the magazine 'Aeon', is a reflection on what Language Deciphering is today and how life can get complicate (or 'bizarre') for a glyph-breaker. In our times, glyph-breakers cannot be anymore 'epic' figures like... more
In this paper we consider the problem of securely measuring distance between two nodes in a wireless sensor network. The problem of measuring distance has fundamental applications in both localization and time synchronization, and thus... more
We study the problem of characterizing the wormhole attack, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node. Making use of geometric random graphs... more
Onion routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Onion routing's anonymous connections are... more
For a long time, random numbers have been used in many fields of application. Much work has been conducted to generate truly random numbers and is still in progress. A popular method for generating random numbers is a linear-feedback... more
HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or... more
The notion of Integrated Modular Avionics (IMA) refers to inter-connected pieces of avionics equipment supported by a wired technology, with stringent reliability and safety requirements. If the inter-connecting wires are physically... more
EMV (Europay MasterCard Visa) is a globally accepted standard for chip card-based payment transactions, which benefits from the intrinsic security characteristics of chip cards. The EMV specification is relatively flexible and can be... more
Thalamita crenata is one of the most common swimming crabs of the mangrove creeks of the East African coast. In Mida Creek, Kenya, this species inhabits the extreme seaward fringe of the mangrove swamp and the intertidal platform in front... more
This paper goes for taking care of the issues of layman which are being confronted all the live long day relating to District Council.A site outlined with Responsive Web Development (RWD) adjusts the format to the client by utilizing... more
1(M.Tech. Scholar), Swami Vivekanand College of Science and Technology 2A.Prof., Swami Vivekanand College of Science and Technology... more
1(M.Tech. Scholar), Swami Vivekanand College of Science and Technology 2A.Prof., Swami Vivekanand College of Science and Technology... more
In recent years, the concept of the Internet of Things has been introduced. Information, communication, and network technology can be integrated, so that the unmanned aerial vehicle (UAV) from consumer leisure and entertainment toys can... more
The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fields. However, that does not... more
We present Kaleidoscope an innovative system that supports live forensics for application performance problems caused by either individual component failures or resource contention issues in large-scale distributed storage systems. The... more
Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via... more
gave me to visit USC and LA, their great hospitality, and the precious help and collaboration to perform the research topic, which is the base of this thesis.
An increasing number of healthcare applications are making use of wireless body sensor networks (WBSNs). WBSN technology provides a framework that allows for remote physiological monitoring of patients without the use of wired connections... more
We propose a new scheme for synchronization of the optical chaos generated by a semiconductor laser subjected to external reflection. The scheme is based on optical feedback and will be analyzed from the viewpoint of static and dynamic... more
Interactions with outside world are not only natural but mandatory, in DIS user can communicate to doctors through the system for retrieving information about diseases by giving symptoms as input. The system is designed specifically for... more
The security policy addresses constraints on functions and flow among them, constraints on access by external systems and adversaries including programs and access to data by people. Sound security policies architecture protects... more
The Stratfraudian claim that William Shakspere of Stratford was the writer of the Shakespeare poems and plays and that none of his contemporaries ever doubted this, is a demonstrable falsehood. The ‘Witness’ book and video series... more
The whole foundation of the fraud that William Shakspere of Stratford wrote the Shakespeare poems and plays rests upon the lie/falsehood that none of his contemporaries in the Elizabethan and Jacobean eras expressed any doubts about his... more
Security of data is the major concern in today’s scenario. Transferring of data from one source point to a destination point is referred as data transfer. Encryption is one of the methods which is widely used for transfer of information... more
A Stream Cipher (SC) is a symmetric-key encryption type that scrambles each piece of data in clear text to conceal it from hackers. Despite its advantages, it has a substantial challenge. Correct handwriting of the script code for the... more
This paper examines the transformative potential of artificial intelligence (AI) in enhancing cybersecurity, particularly within Security Operations Centers (SOCs). By integrating advanced machine learning and deep learning techniques, AI... more
Restraint and conciliation can seem maddeningly ineffectivebut they are still the last, best hope for peace.
Cryptography is the science of maintaining data confidentiality, where the original text (plaintext) is encrypted using an encryption key to be ciphertext (text that has been encrypted). In this case cryptography secures data from a third... more
Citra memegang peranan sangat penting dalam bentuk informasi visual sebagai salah satu komponen multimedia. Peredaran citra dalam bentuk digital sangat mudah dan cepat baik melalui media sosial atau E-mail (Elektronic-mail). Citra digital... more
Machine learning relies on the availability of vast amounts of data for training. However, in reality, data are mostly scattered across different organizations and cannot be easily integrated due to many legal and practical constraints.... more
With the fast development of blockchain technology in latest years, its application in scenarios that require privacy, such as health area, became encouraged and widely discussed. This paper presents an architecture to ensure the privacy... more
In a network analysis, find the critical path of the problem is an important techniques which involves planning and control of the large projects that are very complex in nature. Clear identification of each task will help to implement... more
As mobile devices enter a new era with high speed connectivity and increasing compute capabilities a new class of applications called social networking applications is being showcased as the next revolution in mobile computing. In this... more