Listar por tema "cryptography"
Mostrando ítems 1-7 de 7
-
Biometry, the safe key
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2010)Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key? -
Desarrollo de un software educativo para la función hash BLAKE2
(21/07/2022)En la actualidad existen multitud de algoritmos y mecanismos para la criptografía. Estos son cada vez más complejos, lo cual dificulta su aprendizaje por parte de los alumnos. Aunque ya existen diversos programas de apoyo ... -
Genetic Operators Applied to Symmetric Cryptography
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2019)In this article, a symmetric-key cryptographic algorithm for text is proposed, which applies Genetic Algorithms philosophy, entropy and modular arithmetic. An experimental methodology is used over a deterministic system, ... -
Secure and efficient transmission of data based on Caesar Cipher Algorithm for Sybil attack in IoT
(Springer Science and Business Media Deutschland GmbH, 2021)The Internet of Things (IoT) is an emerging concept in the field of information technology. IoT can integrate any real-time entity with another, using sensing, computing and communication capabilities to offer enhanced ... -
Secure Information Transmission Device Implemented on an Embedded System using 3DES and AES Algorithms
(International Journal of Engineering Research and Technology, 2019)The main objective of this article is to implement a hardware-software prototype for sending and receiving secure information between a PC and an embedded system, using cryptographic algorithms 3DES (Triple DES) and 3 ... -
TD2SecIoT: Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2020)The Internet of Things (IoT) is an emerging technology, which comprises wireless smart sensors and actuators. Nowadays, IoT is implemented in different areas such as Smart Homes, Smart Cities, Smart Industries, Military, ... -
User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 05/2024)Nowadays, a lot of data is stored in the cloud for sharing purposes across various domains. The increasing number of security issues with cloud data raises confidentiality concerns about keeping these stored or shared data. ...