Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








67,039 Hits in 4.1 sec

Secure log management for privacy assurance in electronic communications

Vassilios Stathopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos
2008 Computers & security  
Integrity Digital signatures a b s t r a c t In this paper we examine logging security in the environment of electronic communication providers.  ...  We review existing security threat models for system logging and we extend these to a new security model especially suited for communication network providers, which also considers internal modification  ...  The proposed procedure involves (1) Asynchronous signing of the log files in predefined time periods. (2) Real-time signing of the critical log events. (3) Real-time signing of random log events. (4) Remote  ... 
doi:10.1016/j.cose.2008.07.010 fatcat:rygquoksgzcn5pklfu3y7mzlie

Internet of Things: Impact of IoT in Business Environment and Challenges in Secure Implementation

2020 International journal of recent technology and engineering  
In recent advancement, different types of embedded IoT devices are connected together with wireless network and continuously access internet for communication.  ...  Whereas the rapid growth rate of IoT network is getting attention of the cyber criminals.  ...  So this digital signature scheme is desirable in IoT network for the protection of authenticity of messages. B.  ... 
doi:10.35940/ijrte.b3949.079220 fatcat:5d2kop5y4zgwtcmmqnsredavju

Online Signature Verification Using Normalized Dynamic Feature With Artificial Neural Network Classification

Manish Trikha *, Maitreyee Dutta
2016 Zenodo  
, the proposed system used digital tablet with digital pen for acquisition of the signature and extract three dynamic features of the signature i.e., x,y coordinate of the signature along with the pressure  ...  at different points of the signature and from this dynamic features 11 different feature set is calculated and then using this feature set a neural network is trained for classification, the proposed  ...  ACKNOWLEDGEMENTS The author would like to thank Director, National Institute of Technical Teacher Training and Research, Chandigarh, India for their constant support and inspiration throughout this research  ... 
doi:10.5281/zenodo.154249 fatcat:6n6sh5yn3nhxtonuahnm6ut5li

Modelling of Security Principles Within Car-to-Car Communications in Modern Cooperative Intelligent Transportation Systems

Jan Durech, Maria Franekova, Peter Holecko, Emilia Bubenikova
2016 Advances in Electrical and Electronic Engineering  
Curve Digital Signature Algorithm) for different key-lengths suitable for real time VANET communications for safety-critical applications of C-ITS.  ...  The OpenSSL library has also been utilised for the comparison of time demandingness of digital signature schemes based on RSA (Rivest Shamir Adleman), DSA (Digital Signature Algorithm) and ECDSA (Elliptic  ...  safety critical applications.  ... 
doi:10.15598/aeee.v14i1.1279 fatcat:edygeahb6rhqpnqf2ypuuwx5mi

Distributed Aggregation Of Attributed Based Signature Scheme For Authenticated Communication In Vanet

S. Keerthana, T. Geetha
2018 Zenodo  
Vehicular Ad hoc Networks (VANETs) consists of vehicles and distributed roadside units (RSUs).  ...  If the messages cannot be processed in time, occurrence of traffic jams and accidents is possible.  ...   Real Time Video Relay: On-demand movie experience will not be confined to the constraints of the home and the driver can ask for real time video relay of his favorite movies.   ... 
doi:10.5281/zenodo.1154901 fatcat:omwetjognnhipbfg5x7akrorby

A Systematic Approach for Attack Analysis and Mitigation in V2V Networks

Bharat K. Bhargava, Amber M. Johnson, Gisele Izera Munyengabe, Pelin Angin
2016 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
Accurate assessment of the safety and security needs of V2V networks based on context and the costs associated with attack mitigation mechanisms are significant for successful operation of these networks  ...  In this paper we provide an analysis of the major security and reliability issues in V2V networks, and propose a systematic approach for the analysis and mitigation of attacks, based on the break-down  ...  The network must be available all the time 4. The sender of each message must be identified reliably 5. "Strict time constraint" of real-time messages must be honored.  ... 
doi:10.22667/jowua.2016.03.31.079 dblp:journals/jowua/BhargavaJMA16 fatcat:m3ej7zx4ofha3oq4efsfnvkbm4

A new perspective towards the development of robust data-driven intrusion detection for industrial control systems

Abiodun Ayodeji, Yong-kuo Liu, Nan Chao, Li-qun Yang
2020 Nuclear Engineering and Technology  
Most machine learning-based intrusion detection tools developed for Industrial Control Systems (ICS) are trained on network packet captures and relies on monitoring network layer traffic alone for intrusion  ...  In cyber-physical systems (CPS), the introduction of digital systems has produced a network of safety components with programmable logic controllers (PLCs), which provide information useful for control  ...  Real-time implementation of this system is critical, to eliminate manual network traffic data sorting and additional pre-processes expertise. VI.  ... 
doi:10.1016/j.net.2020.05.012 fatcat:3wptel7b3ngb5lfh352ycm3ysu

HAA: Hardware-Accelerated Authentication for internet of things in mission critical vehicular networks

Ankush Singla, Anand Mudgerikar, Ioannis Papapanagiotou, Attila A. Yavuz
2015 MILCOM 2015 - 2015 IEEE Military Communications Conference  
In military vehicular networks, it is vital to prevent adversaries from manipulating critical messages via cryptographic protection (e.g., digital signatures) and at the same time to minimize the impact  ...  In this paper, we developed Hardware-Accelerated Authentication (HAA) that enables practical realization of delay-aware signatures for vehicular networks.  ...  Acknowledgment We gratefully acknowledge the support of NVIDIA Corporation with the donation of the Tesla K40 GPU and Tesla K1 used for this research.  ... 
doi:10.1109/milcom.2015.7357624 dblp:conf/milcom/SinglaMPY15 fatcat:u2awzmoz5ne67eu73ixugdeoka

Various Techniques to detect DOS attack in VANET: A Review

Rajwinder Kaur, Usvir Kaur
2017 International Journal of Computer Applications  
In the network various when some malicious nodes join the network and that nodes are responsible to trigger DOS type of attack which reduce network performance.  ...  Due to decentralized architecture of vehicular adhoc networks many malicious nodes may join the network which is responsible to trigger various type of active and passive type of attacks.  ...  For authenticating messages the standard uses ECDSA as the standard digital signature algorithm. But the verification time for an ECDSA signature is very high.  ... 
doi:10.5120/ijca2017913718 fatcat:pezg2z32ebbydb27mggmzp4iha

A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications

Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk
2021 IEEE Transactions on Vehicular Technology  
The security, privacy, and other desirable features of authentication in vehicular networks have been widely studied.  ...  Our model can effectively analyze the delay introduced by an authentication protocol, and determine whether this would result in a crash, in the real world vehicular environments.  ...  In this regard, many studies propose authentication mechanisms using digital signature schemes, such as Elliptic Curve Digital Signature Algorithm (ECDSA) [32] which is a digital signature algorithm  ... 
doi:10.1109/tvt.2021.3097088 fatcat:s7l7fey2n5h3zgnkz24nqd5jwu

Digital Signature-Based Secure Communication in Cognitive Radio Networks

Sazia Parvin, Farookh Khadeer Hussain
2011 2011 International Conference on Broadband and Wireless Computing, Communication and Applications  
Since the member of Cognitive Radio Networks may join or leave the network at any time, the issue of supporting secure communication in CRNs becomes more critical than the other conventional wireless networks  ...  This work thus proposes digital signature-based secure communication in CRNs. Need more to describe. The security analysis is analyzed to guarantee that the proposed approach achieves security proof.  ...  PROPOSED SCHEME In this section, we proposed digital signature for secure communication in cognitive radio networks.  ... 
doi:10.1109/bwcca.2011.95 dblp:conf/bwcca/ParvinH11 fatcat:kgjsx4s3mrejdg2yxptik7vkq4

Use of Blockchain Mechanisms in PLC Control and Safety Critical Processes

Dušan Horváth, Maximilián Strémy
2021 Research Papers. Faculty of Materials Science and Technology. Slovak University of Technology in Trnava  
Some researchers have revealed critical vulnerability of the control systems.  ...  In this paper, we briefly summarize the current situation, and introduce our solution to the check of changes in PLC via other nodes in industrial network.  ...  Acknowledgement This publication was supported by the Operational Program Research and Innovation for the project Scientific and Research Centre of Excellence SlovakION for Material and Interdisciplinary  ... 
doi:10.2478/rput-2021-0018 fatcat:kdnyrxu4crfcpiivhbsizxa754

DeepWriteSYN: On-Line Handwriting Synthesis via Deep Short-Term Representations

Ruben Tolosana, Paula Delgado-Santos, Andres Perez-Uribe, Ruben Vera-Rodriguez, Julian Fierrez, Aythami Morales
2020 arXiv   pre-print
These two cases are developed experimentally for individual digits and handwriting signatures, respectively, achieving in both cases remarkable results.  ...  Also, we provide experimental results for the task of on-line signature verification showing the high potential of DeepWriteSYN to improve significantly one-shot learning scenarios.  ...  e.g., synthetic signature variation for the same subject) Short-Term Handwriting Dataset (e.g., on-line handwriting digits) Limited number of classes (0-9 digits) Few time samples per digit (<100  ... 
arXiv:2009.06308v2 fatcat:gxowlqmhpjffbfwc7v6ch6zgpi

Page 23 of American Sportswear & Knitting Times Vol. 67, Issue 4 [page]

1998 American Sportswear & Knitting Times  
Signature Artist - Lettering, Editing & Digitizing for Embroidery; Pulse Signature Designer - Lettering, Editing & Digitizing for Embroidery; Pulse Signature Maestro - Advanced Lettering, Editing & Digitizing  ...  Hauppauge, NY 11788 516-436-7100 FAX: 516-436-7792 PROGRAM NAME: Pulse Signature Editor - Lettering & Editing for Embroidery; Pulse Signature Puncher - Lettering, Editing & Digitizing for Embroidery; Pulse  ... 

Content Protection in Named Data Networking: Challenges and Potential Solutions [article]

Yong Yu, Yannan Li, Xiaojiang Du, Ruonan Chen, Bo Yang
2018 arXiv   pre-print
We propose a variety of digital signature schemes to achieve the data integrity and origin authentication in NDN for various applications, which include cost-effective signatures, privacy-preserving signatures  ...  , network coding signatures, and post-quantum signatures.  ...  Batch verification [14] enables a verifier to take less time in validating multiple digital signatures simultaneously than the overall time for all the single signature verification.  ... 
arXiv:1810.11179v1 fatcat:bsajaxqc3jepzedb3o4kruqyam
« Previous Showing results 1 — 15 out of 67,039 results