A secure and robust scheme for sharing confidential information in IoT systems
Abstract In Internet of Things (IoT) systems with security demands, there is often a need to
distribute sensitive information (such as encryption keys, digital signatures, or login …
distribute sensitive information (such as encryption keys, digital signatures, or login …
The application of the methodology for secure cyber–physical systems design to improve the semi-natural model of the railway infrastructure
The paper suggests a new methodology for secure cyber–physical systems design. The
proposed methodology consists of two main cycles. The main goal of the first cycle is in …
proposed methodology consists of two main cycles. The main goal of the first cycle is in …
Applying cheating identifiable secret sharing scheme in multimedia security
Z Ma, Y Ma, X Huang, M Zhang, Y Liu - EURASIP Journal on Image and …, 2020 - Springer
In (k, n) secret sharing scheme, one secret is encrypted into n shares in such a way that only
k or more shares can decrypt the secret. Secret sharing scheme can be extended into the …
k or more shares can decrypt the secret. Secret sharing scheme can be extended into the …
Design and verification methodology for secure and distributed cyber-physical systems
The paper considers a new design and verification methodology for secure and distributed
cyber-physical systems, which contain microcontroller-based devices. The key idea of the …
cyber-physical systems, which contain microcontroller-based devices. The key idea of the …
Plaintext recovery attack on 3DES algorithm with different byte keys
J Gong - Journal of Intelligent & Fuzzy Systems, 2020 - content.iospress.com
Aiming at the problem of plaintext recovery attack on 3DES algorithm with different byte
keys, a plaintext recovery method for 3DES algorithm with different byte keys is proposed. In …
keys, a plaintext recovery method for 3DES algorithm with different byte keys is proposed. In …
Models, algorithms and methodology for design of microcontroller-based physical security systems protected from cyber-physical attacks
D Levshun - 2021 - theses.hal.science
One of the possible ways to ensure the security of microcontroller-based systems is the
implementation of security by design approach. Unfortunately, existing approaches are not …
implementation of security by design approach. Unfortunately, existing approaches are not …
Методика проектирования и верификации защищенных киберфизических систем
ДС Левшун, АА Чечулин, ИВ Котенко - Вестник Санкт-Петербургского …, 2019 - elibrary.ru
В данной работе описана архитектура новой методики проектирования и верификации
защищенных киберфизических систем, содержащих устройства на основе …
защищенных киберфизических систем, содержащих устройства на основе …
Identity-based group devices authentication scheme for Internet of Things
Internet of things (IoT) is used to provide real-time data collection and analysis of the target
area by the cooperation of low-cost devices. The authentication towards multiple devices …
area by the cooperation of low-cost devices. The authentication towards multiple devices …
A practical group authentication scheme for smart devices in IoT
Internet of things (IoT) is used to provide real-time data collection and analysis of the target
area by the cooperation of low-cost devices. The authentication towards multiple devices …
area by the cooperation of low-cost devices. The authentication towards multiple devices …
[PDF][PDF] An improved secure data transmission protocol based on d2d for mobile health system [j]
YN Zhang, HB Mu - Journal of Computers, 2019 - csroc.org.tw
Mobile-Health (M-Health) system is a growing field that enables physicians to monitor
remote patients' health status and facilitates the sharing of medical records among medical …
remote patients' health status and facilitates the sharing of medical records among medical …