A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure log management for privacy assurance in electronic communications
2008
Computers & security
Integrity Digital signatures a b s t r a c t In this paper we examine logging security in the environment of electronic communication providers. ...
We review existing security threat models for system logging and we extend these to a new security model especially suited for communication network providers, which also considers internal modification ...
The proposed procedure involves (1) Asynchronous signing of the log files in predefined time periods. (2) Real-time signing of the critical log events. (3) Real-time signing of random log events. (4) Remote ...
doi:10.1016/j.cose.2008.07.010
fatcat:rygquoksgzcn5pklfu3y7mzlie
Internet of Things: Impact of IoT in Business Environment and Challenges in Secure Implementation
2020
International journal of recent technology and engineering
In recent advancement, different types of embedded IoT devices are connected together with wireless network and continuously access internet for communication. ...
Whereas the rapid growth rate of IoT network is getting attention of the cyber criminals. ...
So this digital signature scheme is desirable in IoT network for the protection of authenticity of messages.
B. ...
doi:10.35940/ijrte.b3949.079220
fatcat:5d2kop5y4zgwtcmmqnsredavju
Online Signature Verification Using Normalized Dynamic Feature With Artificial Neural Network Classification
2016
Zenodo
, the proposed system used digital tablet with digital pen for acquisition of the signature and extract three dynamic features of the signature i.e., x,y coordinate of the signature along with the pressure ...
at different points of the signature and from this dynamic features 11 different feature set is calculated and then using this feature set a neural network is trained for classification, the proposed ...
ACKNOWLEDGEMENTS The author would like to thank Director, National Institute of Technical Teacher Training and Research, Chandigarh, India for their constant support and inspiration throughout this research ...
doi:10.5281/zenodo.154249
fatcat:6n6sh5yn3nhxtonuahnm6ut5li
Modelling of Security Principles Within Car-to-Car Communications in Modern Cooperative Intelligent Transportation Systems
2016
Advances in Electrical and Electronic Engineering
Curve Digital Signature Algorithm) for different key-lengths suitable for real time VANET communications for safety-critical applications of C-ITS. ...
The OpenSSL library has also been utilised for the comparison of time demandingness of digital signature schemes based on RSA (Rivest Shamir Adleman), DSA (Digital Signature Algorithm) and ECDSA (Elliptic ...
safety critical applications. ...
doi:10.15598/aeee.v14i1.1279
fatcat:edygeahb6rhqpnqf2ypuuwx5mi
Distributed Aggregation Of Attributed Based Signature Scheme For Authenticated Communication In Vanet
2018
Zenodo
Vehicular Ad hoc Networks (VANETs) consists of vehicles and distributed roadside units (RSUs). ...
If the messages cannot be processed in time, occurrence of traffic jams and accidents is possible. ...
Real Time Video Relay: On-demand movie experience will not be confined to the constraints of the
home and the driver can ask for real time video relay of his favorite movies.
...
doi:10.5281/zenodo.1154901
fatcat:omwetjognnhipbfg5x7akrorby
A Systematic Approach for Attack Analysis and Mitigation in V2V Networks
2016
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
Accurate assessment of the safety and security needs of V2V networks based on context and the costs associated with attack mitigation mechanisms are significant for successful operation of these networks ...
In this paper we provide an analysis of the major security and reliability issues in V2V networks, and propose a systematic approach for the analysis and mitigation of attacks, based on the break-down ...
The network must be available all the time 4. The sender of each message must be identified reliably 5. "Strict time constraint" of real-time messages must be honored. ...
doi:10.22667/jowua.2016.03.31.079
dblp:journals/jowua/BhargavaJMA16
fatcat:m3ej7zx4ofha3oq4efsfnvkbm4
A new perspective towards the development of robust data-driven intrusion detection for industrial control systems
2020
Nuclear Engineering and Technology
Most machine learning-based intrusion detection tools developed for Industrial Control Systems (ICS) are trained on network packet captures and relies on monitoring network layer traffic alone for intrusion ...
In cyber-physical systems (CPS), the introduction of digital systems has produced a network of safety components with programmable logic controllers (PLCs), which provide information useful for control ...
Real-time implementation of this system is critical, to eliminate manual network traffic data sorting and additional pre-processes expertise.
VI. ...
doi:10.1016/j.net.2020.05.012
fatcat:3wptel7b3ngb5lfh352ycm3ysu
HAA: Hardware-Accelerated Authentication for internet of things in mission critical vehicular networks
2015
MILCOM 2015 - 2015 IEEE Military Communications Conference
In military vehicular networks, it is vital to prevent adversaries from manipulating critical messages via cryptographic protection (e.g., digital signatures) and at the same time to minimize the impact ...
In this paper, we developed Hardware-Accelerated Authentication (HAA) that enables practical realization of delay-aware signatures for vehicular networks. ...
Acknowledgment We gratefully acknowledge the support of NVIDIA Corporation with the donation of the Tesla K40 GPU and Tesla K1 used for this research. ...
doi:10.1109/milcom.2015.7357624
dblp:conf/milcom/SinglaMPY15
fatcat:u2awzmoz5ne67eu73ixugdeoka
Various Techniques to detect DOS attack in VANET: A Review
2017
International Journal of Computer Applications
In the network various when some malicious nodes join the network and that nodes are responsible to trigger DOS type of attack which reduce network performance. ...
Due to decentralized architecture of vehicular adhoc networks many malicious nodes may join the network which is responsible to trigger various type of active and passive type of attacks. ...
For authenticating messages the standard uses ECDSA as the standard digital signature algorithm. But the verification time for an ECDSA signature is very high. ...
doi:10.5120/ijca2017913718
fatcat:pezg2z32ebbydb27mggmzp4iha
A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications
2021
IEEE Transactions on Vehicular Technology
The security, privacy, and other desirable features of authentication in vehicular networks have been widely studied. ...
Our model can effectively analyze the delay introduced by an authentication protocol, and determine whether this would result in a crash, in the real world vehicular environments. ...
In this regard, many studies propose authentication mechanisms using digital signature schemes, such as Elliptic Curve Digital Signature Algorithm (ECDSA) [32] which is a digital signature algorithm ...
doi:10.1109/tvt.2021.3097088
fatcat:s7l7fey2n5h3zgnkz24nqd5jwu
Digital Signature-Based Secure Communication in Cognitive Radio Networks
2011
2011 International Conference on Broadband and Wireless Computing, Communication and Applications
Since the member of Cognitive Radio Networks may join or leave the network at any time, the issue of supporting secure communication in CRNs becomes more critical than the other conventional wireless networks ...
This work thus proposes digital signature-based secure communication in CRNs. Need more to describe. The security analysis is analyzed to guarantee that the proposed approach achieves security proof. ...
PROPOSED SCHEME In this section, we proposed digital signature for secure communication in cognitive radio networks. ...
doi:10.1109/bwcca.2011.95
dblp:conf/bwcca/ParvinH11
fatcat:kgjsx4s3mrejdg2yxptik7vkq4
Use of Blockchain Mechanisms in PLC Control and Safety Critical Processes
2021
Research Papers. Faculty of Materials Science and Technology. Slovak University of Technology in Trnava
Some researchers have revealed critical vulnerability of the control systems. ...
In this paper, we briefly summarize the current situation, and introduce our solution to the check of changes in PLC via other nodes in industrial network. ...
Acknowledgement This publication was supported by the Operational Program Research and Innovation for the project Scientific and Research Centre of Excellence SlovakION for Material and Interdisciplinary ...
doi:10.2478/rput-2021-0018
fatcat:kdnyrxu4crfcpiivhbsizxa754
DeepWriteSYN: On-Line Handwriting Synthesis via Deep Short-Term Representations
2020
arXiv
pre-print
These two cases are developed experimentally for individual digits and handwriting signatures, respectively, achieving in both cases remarkable results. ...
Also, we provide experimental results for the task of on-line signature verification showing the high potential of DeepWriteSYN to improve significantly one-shot learning scenarios. ...
e.g., synthetic signature
variation for the same subject)
Short-Term Handwriting Dataset
(e.g., on-line handwriting digits)
Limited number of classes (0-9 digits)
Few time samples per digit (<100 ...
arXiv:2009.06308v2
fatcat:gxowlqmhpjffbfwc7v6ch6zgpi
Page 23 of American Sportswear & Knitting Times Vol. 67, Issue 4
[page]
1998
American Sportswear & Knitting Times
Signature Artist - Lettering, Editing & Digitizing for Embroidery; Pulse Signature Designer - Lettering, Editing & Digitizing for Embroidery; Pulse Signature Maestro - Advanced Lettering, Editing & Digitizing ...
Hauppauge, NY 11788 516-436-7100
FAX: 516-436-7792 PROGRAM NAME: Pulse Signature Editor - Lettering & Editing for Embroidery; Pulse Signature Puncher - Lettering, Editing & Digitizing for Embroidery; Pulse ...
Content Protection in Named Data Networking: Challenges and Potential Solutions
[article]
2018
arXiv
pre-print
We propose a variety of digital signature schemes to achieve the data integrity and origin authentication in NDN for various applications, which include cost-effective signatures, privacy-preserving signatures ...
, network coding signatures, and post-quantum signatures. ...
Batch verification [14] enables a verifier to take less time in validating multiple digital signatures simultaneously than the overall time for all the single signature verification. ...
arXiv:1810.11179v1
fatcat:bsajaxqc3jepzedb3o4kruqyam
« Previous
Showing results 1 — 15 out of 67,039 results