Two-stage data encryption using chaotic neural networks
G Srivastava, CNS Vinoth Kumar… - Journal of Intelligent …, 2020 - content.iospress.com
Securing a wireless sensor system is a hard task for researchers today. Strengthening the
authentication system before connection establishment is the right way to enhance the …
authentication system before connection establishment is the right way to enhance the …
A novel data exploitation framework based on blockchain
As we are moving towards the Internet of Things (IoT), the number of connected objects is
growing at a rapid pace. These smart devices continuously generate enormous amounts of …
growing at a rapid pace. These smart devices continuously generate enormous amounts of …
[图书][B] Channel coding for hardware-intrinsic security
S Müelich - 2020 - oparu.uni-ulm.de
Hardware-intrinsic security studies cryptographic methods, whose implementations are
assisted by some specific physical properties of the hardware on which they are executed …
assisted by some specific physical properties of the hardware on which they are executed …
Defense in Depth of Resource-Constrained Devices
IR Jenkins - 2020 - search.proquest.com
The emergent next generation of computing, the so-called Internet of Things (IoT), presents
significant challenges to security, privacy, and trust. The devices commonly used in IoT …
significant challenges to security, privacy, and trust. The devices commonly used in IoT …
[PDF][PDF] Semestre SILM: livre blanc
G Hiet - 2020 - hal.science
La sécurité des composants logiciels et celle des composants matériels ont souvent été
considérées comme deux problèmes spécifiques, abordés par des communautés distinctes …
considérées comme deux problèmes spécifiques, abordés par des communautés distinctes …
[图书][B] Secure and efficient processing of outsourced data structures using trusted execution environments
B Fuhry - 2020 - search.proquest.com
In recent years, more and more companies make use of cloud computing; in other words,
they outsource data storage and data processing to a third party, the cloud provider. From …
they outsource data storage and data processing to a third party, the cloud provider. From …
Virtual vault of licensed content
A technique for content management involves storing runtime state of content externally. A
system created according to the technique may include a state server that receives runtime …
system created according to the technique may include a state server that receives runtime …
Systems and methods for facilitating secure streaming of electronic gaming content
A game identifier of an encrypted streaming electronic game to be streamed to a playback
device may be received. The game identifier may comprise a title of the encrypted streaming …
device may be received. The game identifier may comprise a title of the encrypted streaming …