• Biometry, the safe key 

      Fraile Hurtado, María; Herrero Langreo, Miguel; Menéndez de Miguel, Pilar; Delgado Villanueva, Valerio (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2010)
      Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?
    • Desarrollo de un software educativo para la función hash BLAKE2 

      Vélez-Recio, Ismael (21/07/2022)
      En la actualidad existen multitud de algoritmos y mecanismos para la criptografía. Estos son cada vez más complejos, lo cual dificulta su aprendizaje por parte de los alumnos. Aunque ya existen diversos programas de apoyo ...
    • Genetic Operators Applied to Symmetric Cryptography 

      Rodríguez, Jefferson; Corredor, Brayan; Suárez, César (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2019)
      In this article, a symmetric-key cryptographic algorithm for text is proposed, which applies Genetic Algorithms philosophy, entropy and modular arithmetic. An experimental methodology is used over a deterministic system, ...
    • Secure and efficient transmission of data based on Caesar Cipher Algorithm for Sybil attack in IoT 

      Thuluva, Aditya Sai Srinivas; Somanathan, Manivannan Sorakaya; Somula, Ramasubbareddy; Sennan, Sankar; Burgos, Daniel (Springer Science and Business Media Deutschland GmbH, 2021)
      The Internet of Things (IoT) is an emerging concept in the field of information technology. IoT can integrate any real-time entity with another, using sensing, computing and communication capabilities to offer enhanced ...
    • Secure Information Transmission Device Implemented on an Embedded System using 3DES and AES Algorithms 

      Martínez Santa, Ricardo ; Martínez Santa, Fernando; Montiel Ariza, Holman (International Journal of Engineering Research and Technology, 2019)
      The main objective of this article is to implement a hardware-software prototype for sending and receiving secure information between a PC and an embedded system, using cryptographic algorithms 3DES (Triple DES) and 3 ...
    • TD2SecIoT: Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT 

      Dejene, Dawit; Tiwari, Basant; Tiwari, Vivek (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2020)
      The Internet of Things (IoT) is an emerging technology, which comprises wireless smart sensors and actuators. Nowadays, IoT is implemented in different areas such as Smart Homes, Smart Cities, Smart Industries, Military, ...