Oblivious hashing: A stealthy software integrity verification primitive

Y Chen, R Venkatesan, M Cary, R Pang… - Information Hiding: 5th …, 2003 - Springer
We describe a novel software verification primitive called Oblivious Hashing. Unlike
previous techniques that mainly verify the static shape of code, this primitive allows implicit …

[PDF][PDF] Efficient and secure elliptic curve cryptography implementation of curve p-256

M Adalier, A Teknik - Workshop on elliptic curve cryptography …, 2015 - csrc.nist.gov
Public key cryptography has become the de facto standard for secure communications over
the Internet and other communications media such as cellular and Wi-Fi. Elliptic curves offer …

Method for producing key material for use in communication with network

S Holtmanns, P Laitinen, P Ginzboorg… - US Patent …, 2013 - Google Patents
This invention relates to security procedures in a communication system, specifically to
production of key material. The invention provides a method for producing key material in a …

An efficient biometric and password-based remote user authentication using smart card for telecare medical information systems in multi-server environment

T Maitra, D Giri - Journal of medical systems, 2014 - Springer
The medical organizations have introduced Telecare Medical Information System (TMIS) to
provide a reliable facility by which a patient who is unable to go to a doctor in critical or …

ChevroCrypto–Blockchain Cryptographic File System Prototype

F Alves, N Mateus-Coelho, M Cruz-Cunha - Procedia Computer Science, 2023 - Elsevier
Abstract The Internet of Things technologies are progressively being incorporated into the
different difficulties that occur and ensuring data protection from these systems is becoming …

Encryption file system framework-proof of concept

F Alves, N Mateus-Coelho, M Cruz-Cunha - Procedia Computer Science, 2021 - Elsevier
Edge Computing, also known as the IoT ecosystem, has recently become a cornerstone of
computational evolution. Most recently, challenges emerged in the act of protecting such …

A secure geographical routing protocol for highly-dynamic aeronautical networks

A Swidan, S Khattab, Y Abouelseoud… - MILCOM 2015-2015 …, 2015 - ieeexplore.ieee.org
Geographical routing protocols in highly-dynamic aeronautical ad-hoc networks are
vulnerable to fake geo-location information as an attack that affects network performance. In …

Simulation and developed A5/3

NH Jawad - … International Conference on Current Research in …, 2017 - ieeexplore.ieee.org
The purpose of this paper is the simulation development of A5/3 algorithms used by GSM
networks security, one of the elements of the GSM networks security is A5/3 algorithm. the …

[PDF][PDF] A Novel Multiple Key Block Ciphering Mechanism with Reduced Computational Overhead

VSS Sriram, AK Maurya, G Sahoo - International Journal of Computer …, 2010 - Citeseer
Cryptanalysis of symmetric key cryptography encourages large key size and complex
operations to achieve message confidentiality. All these techniques pose computational …

A study on secure intrusion detection system in wireless MANETs to increase the performance of Eaack

G Gowthaman, G Komarasamy - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Mobile Ad hoc Network (MANET) has been pervasive in many applications, including some
procedures such as security in critical applications has been a major threats in MANETs …