Two-stage data encryption using chaotic neural networks

G Srivastava, CNS Vinoth Kumar… - Journal of Intelligent …, 2020 - content.iospress.com
Securing a wireless sensor system is a hard task for researchers today. Strengthening the
authentication system before connection establishment is the right way to enhance the …

A novel data exploitation framework based on blockchain

O Dib, C Huyart, K Toumi - Pervasive and Mobile Computing, 2020 - Elsevier
As we are moving towards the Internet of Things (IoT), the number of connected objects is
growing at a rapid pace. These smart devices continuously generate enormous amounts of …

[图书][B] Channel coding for hardware-intrinsic security

S Müelich - 2020 - oparu.uni-ulm.de
Hardware-intrinsic security studies cryptographic methods, whose implementations are
assisted by some specific physical properties of the hardware on which they are executed …

Defense in Depth of Resource-Constrained Devices

IR Jenkins - 2020 - search.proquest.com
The emergent next generation of computing, the so-called Internet of Things (IoT), presents
significant challenges to security, privacy, and trust. The devices commonly used in IoT …

[PDF][PDF] Semestre SILM: livre blanc

G Hiet - 2020 - hal.science
La sécurité des composants logiciels et celle des composants matériels ont souvent été
considérées comme deux problèmes spécifiques, abordés par des communautés distinctes …

[图书][B] Secure and efficient processing of outsourced data structures using trusted execution environments

B Fuhry - 2020 - search.proquest.com
In recent years, more and more companies make use of cloud computing; in other words,
they outsource data storage and data processing to a third party, the cloud provider. From …

Virtual vault of licensed content

W Yen, P Srinivasan, J Princen, R Lo, W Ho - US Patent 10,664,575, 2020 - Google Patents
A technique for content management involves storing runtime state of content externally. A
system created according to the technique may include a state server that receives runtime …

Systems and methods for facilitating secure streaming of electronic gaming content

W Yen, P Srinivasan, J Princen, RW Lo… - US Patent 10,733,271, 2020 - Google Patents
A game identifier of an encrypted streaming electronic game to be streamed to a playback
device may be received. The game identifier may comprise a title of the encrypted streaming …