scispace - formally typeset
Search or ask a question

Answers from top 7 papers

More filters
Papers (7)Insight
Furthermore, if the disk encryption key is not known to the system administrator in advance, it is difficult to achieve a key authentication. In this paper, we propose a scheme which enables to recover the disk encryption key when the user's smart card is lost.
Moreover, the proposed scheme provides a good trade-off between encryption robustness, flexibility, and real-time processing.
I propose a novel encryption and decryption technique which satisfies data confidentiality and integrity.
This paper proposes a new image compression-encryption algorithm based on a meaningful image encryption framework.
Based on our prototype implementation, the encryption service provided by the encryption card has higher-level security and higher efficiency than software encryption.
Simulation results demonstrate that the speeds of encryption/decryption match the data rates of different USB and SD memories.
Experimental results against a smart-card implementation of the Data Encryption Standard demonstrate the effectiveness of our multiple-bit attack.

See what other people are reading

What are the PRNG algorithms that uses prime numbers?
4 answers
PRNG algorithms that utilize prime numbers include those based on the special properties of primitive roots for prime numbers. Additionally, genetic algorithms have been explored for generating large prime numbers crucial in cryptography, particularly for public-key cryptosystems like RSA. While traditional algorithms like Linear Congruential and Lagged Fibonacci generators can produce seemingly random sequences, the randomness of prime numbers remains a complex issue. The connection between random number generation and prime number distribution is intricate, with studies focusing on the underlying properties of prime numbers to understand their distribution patterns and randomness implications. These investigations shed light on the challenges and nuances of incorporating prime numbers into PRNG algorithms for cryptographic applications.
How can chat room implement inside an mobile application?
5 answers
To implement a chat room inside a mobile application, one approach involves developing an automatic interface design testing application using Flutter programming. Another method includes acquiring location information of users, determining their relative distance, and allocating chat rooms based on preset thresholds. Additionally, ensuring secure communication within the chat application is crucial. Implementing encryption mechanisms like the Rabin cryptosystem, symmetric encryption, and session keys can enhance security in mobile chat applications. By combining these approaches, developers can create a user-friendly chat room interface, allocate chat rooms based on user proximity, and enhance security through encryption mechanisms, providing a comprehensive solution for implementing chat rooms in mobile applications.
Amplitude masks in Fourier optics in digital holography
5 answers
Amplitude masks play a crucial role in Fourier optics in digital holography. They are utilized to suppress higher-order image duplicates and enhance the uniformity of off-axis projections. In the context of holographic projectors and near-eye displays, amplitude masks are physically attached to modulator pixels to alter their shape, reducing distractions for viewers and optimizing energetic efficiency. Additionally, in optical image encryption schemes, random amplitude masks are employed to enhance system feasibility, decrease coding compliance, and ensure encryption quality. Amplitude masks are also used in encoding complex field information for generating desired beams in digital micromirrors devices, enabling continuous engineering of field distribution and orbital angular momentum. These masks are essential components in various applications of Fourier optics within the realm of digital holography.
How effective are machine learning algorithms in detecting and preventing ransomware attacks?
5 answers
Machine learning algorithms have proven highly effective in detecting and preventing ransomware attacks. Studies have shown that machine learning models, such as XGBoost and ElasticNet, achieve high accuracy rates of 90% in identifying ransomware attacks on IoT devices running PureOS. Additionally, various machine learning models, including Logistic Regression, K-Nearest Neighbor, and Naive Bayes, have demonstrated accuracy rates between 97% and 100% in distinguishing ransomware encrypted files from other file types, emphasizing the importance of file extensions in the process. Furthermore, experiments utilizing neural networks and other machine learning methods have successfully detected new attack classes, highlighting the effectiveness of these algorithms in combating evolving cybersecurity threats. The use of stream data mining classification techniques, like the Hoeffding trees classifier, has also shown promising results with a classification accuracy of 99.41% in detecting and preventing ransomware attacks.
How counters are used in data processing?
5 answers
Counters play a crucial role in data processing across various applications. They are utilized for tasks such as measurement accuracy maintenance, processing counter data in state machines, encrypting data blocks using counter values for security, and performing redundant arithmetic operations in computer systems. Data logics often rely on counters to specify properties on structured data, linking satisfiability problems to reachability problems for counter systems. By incrementing counters upon data block updates, encryption operations can be enhanced for improved data security. Overall, counters are fundamental components in data processing, enabling efficient measurement, state transitions, encryption, and arithmetic operations in various computational contexts.
How does blockchain technology differ from traditional database systems?
5 answers
Blockchain technology differs from traditional database systems by offering features like immutability, traceability, transparency, availability, and decentralization. Unlike traditional systems, blockchain ensures secure data sharing through attribute encryption, on-chain/off-chain collaboration, and smart contract-based log tracking. It enhances data transparency, information security, and knowledge sharing, surpassing traditional methods. Blockchain's decentralized nature, immutability, and anonymity address privacy concerns in identity management systems, unlike centralized systems with privacy threats and single points of failure. Additionally, blockchain tackles the scalability issue of full replica storage in traditional systems by introducing an Information-Centric Networking-based storage architecture, improving data availability and access time significantly.
What are the negative impact of Drones in terms of Dependence on Weather for Consumers?
5 answers
Consumer-based drone applications face negative impacts due to their dependence on weather conditions.Drones' reliability for time-sensitive operations is hindered by weather limitations, affecting their flyability globally.Adverse weather can disrupt routine drone operations, leading to flight delays and economic losses.Weather conditions pose safety risks for drones, especially in crowded areas like cities, where visibility and control can be compromised.Additionally, the effects of weather on small unmanned aircraft systems (sUAS) are significant, impacting operators, observers, and aircraft during missions, especially when flying beyond visual line of sight (BVLOS).These challenges highlight the need for advancements in weather-resistant drones and comprehensive weather observation and avoidance systems to mitigate the negative impacts of weather dependence on consumer drone applications.
What are requirements for IoT in manufactoring industries?
5 answers
The requirements for IoT in manufacturing industries include cornerstone technologies like IoT and cyber-physical systems, IoT monitoring data as the foundation, big data platforms as the support system, an upgraded computing paradigm as the catalyst, and machine learning-based data analysis as the primary processor. Security is also crucial, with a focus on mutual authentication methods to ensure secure communication in IIoT-enabled systems. Additionally, the need for reliable tracking of production performance in old manufacturing machines is addressed through end-to-end IoT solutions, emphasizing secure encryption key management for communication security. These requirements collectively aim to enhance productivity, quality, and security in smart manufacturing environments within the Industry 4.0 framework.
What are the most common cyber risks faced by e-commerce organizations during PCI DSS certification process?
4 answers
During the PCI DSS certification process, e-commerce organizations commonly face significant cyber risks. These risks include the presence of major vulnerabilities despite certification, as highlighted by Rahaman, Wang, and Yao. The enforcement gap between security standards and real-world practices leads to alarming findings, with 86% of e-commerce websites having at least one PCI DSS violation that should render them non-compliant. Cyber threats such as credit card fraud, phishing attacks, and data leaks pose substantial challenges, impacting revenue and reputation, as discussed by Mitra et al.. Maintaining confidentiality, integrity, and availability of customer data is crucial, emphasizing the importance of cybersecurity in e-commerce operations. These risks necessitate a comprehensive approach to cybersecurity to safeguard sensitive information and ensure secure transactions in the e-commerce sector.
Are there any papers on gels that have multiple properties?
5 answers
Research papers have explored the development of gels with multiple properties. For instance, a study by Zhou et al. demonstrated the engineering of viscoelastic properties in nanoparticle gels, achieving high storage and loss moduli simultaneously. Additionally, Mizuno et al. investigated particulate physical gels with a multiscale nature in their vibrational states and phonon transport properties, showcasing distinct crossovers at specific frequencies. Furthermore, Chen et al. proposed a nanofiber-reinforced hydrogel with reversible information recording, self-encryption, and multi-decryption capabilities, providing a universal information-handling system. These papers collectively highlight the diverse functionalities that gels can possess, ranging from mechanical properties to information handling and phonon transport behaviors.
How do wireless sensor networks differ from traditional wired sensor networks in terms of deployment and maintenance costs?
5 answers
Wireless sensor networks (WSNs) differ from traditional wired sensor networks in deployment and maintenance costs. WSNs offer advantages like greater flexibility, scalability, and the ability to monitor multiple locations simultaneously, leading to lower installation and maintenance costs compared to wired networks. However, a significant challenge for WSNs is their limited lifetime due to battery replacements, which can be costly and time-consuming. To address this, researchers have developed energy-efficient protocols, energy harvesting techniques, and the use of renewable energy sources to improve the lifetime of WSNs. These advancements aim to reduce energy consumption, enable sensors to recharge using ambient energy sources, and provide a reliable power supply through renewable sources like solar panels, ultimately impacting deployment and maintenance costs positively.