ListarUNIR REVISTAS por tema "cryptography"
Mostrando ítems 1-4 de 4
-
Biometry, the safe key
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2010)Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key? -
Genetic Operators Applied to Symmetric Cryptography
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2019)In this article, a symmetric-key cryptographic algorithm for text is proposed, which applies Genetic Algorithms philosophy, entropy and modular arithmetic. An experimental methodology is used over a deterministic system, ... -
TD2SecIoT: Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2020)The Internet of Things (IoT) is an emerging technology, which comprises wireless smart sensors and actuators. Nowadays, IoT is implemented in different areas such as Smart Homes, Smart Cities, Smart Industries, Military, ... -
User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 05/2024)Nowadays, a lot of data is stored in the cloud for sharing purposes across various domains. The increasing number of security issues with cloud data raises confidentiality concerns about keeping these stored or shared data. ...