期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
An Innovative Technique for Constructing Highly Non-Linear Components of Block Cipher for Data Security against Cyber Attacks 被引量:1
1
作者 Abid Mahboob Muhammad Asif +4 位作者 Rana Muhammad Zulqarnain Imran Siddique Hijaz Ahmad Sameh Askar giovanni pau 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2547-2562,共16页
The rapid advancement of data in web-based communication has created one of the biggest issues concerning the security of data carried over the internet from unauthorized access.To improve data security,modern cryptos... The rapid advancement of data in web-based communication has created one of the biggest issues concerning the security of data carried over the internet from unauthorized access.To improve data security,modern cryptosystems use substitution-boxes.Nowadays,data privacy has become a key concern for consumers who transfer sensitive data from one place to another.To address these problems,many companies rely on cryptographic techniques to secure data from illegal activities and assaults.Among these cryptographic approaches,AES is a well-known algorithm that transforms plain text into cipher text by employing substitution box(S-box).The S-box disguises the relationship between cipher text and the key to guard against cipher attacks.The security of a cipher using an S-box depends on the cryptographic strength of the respective S-box.Therefore,various researchers have employed different techniques to construct high order non-linear S-box.This paper provides a novel approach for evolving S-boxes using coset graphs for the action of the alternating group A5 over the finite field and the symmetric group S256.The motivation for this work is to study the symmetric group and coset graphs.The authors have performed various analyses against conventional security criteria such as nonlinearity,differential uniformity,linear probability,the bit independence criterion,and the strict avalanche criterion to determine its high cryptographic strength.To evaluate its image application performance,the proposed S-box is also used to encrypt digital images.The performance and comparison analyses show that the suggested S-box can secure data against cyber-attacks. 展开更多
关键词 Block cipher coset graphs S-BOX triangular group
下载PDF
When Edge Computing Meets IoT Systems: Analysis of Case Studies 被引量:3
2
作者 Fabio Arena giovanni pau 《China Communications》 SCIE CSCD 2020年第10期50-63,共14页
On a macroscopic level,an edge computing architecture looks like a distributed and decentralized IT(Information Technology)architecture.More in detail,it could be defined as a mesh network of micro data centers capabl... On a macroscopic level,an edge computing architecture looks like a distributed and decentralized IT(Information Technology)architecture.More in detail,it could be defined as a mesh network of micro data centers capable of processing and storing critical data locally,and to transmit all data received and/or processed to a central data center or a cloud storage repository.This network topology,also taking advantage of the availability on the market of cost-effective small form factor(SFF)electronic components and systems decreasing,brings the essential components of processing,storage,and networking closer to the sources that generate the data.The typical use case is that of Internet of Things(IoT)devices and implementations,which often face latency problems,lack of bandwidth,reliability,which cannot be addressed through the conventional cloud model.In this context,the edge computing architecture can reduce the size of data to be sent to the cloud,processing critical data,sensitive to latency,at the point of origin,via a smart device,or sending it to an intermediate server,located nearby.The aim of this paper is to report some of the main aspects and significant features of edge computing and analyzing several popular case studies. 展开更多
关键词 edge computing fog computing cloud computing ANALYSIS internet of things
下载PDF
Anatomy of Connected Cars
3
作者 Mario Gerla giovanni pau Rita Tse 《ZTE Communications》 2014年第1期40-45,共6页
The National Highway Traffic Safety Administration in the US and the European Commission are drafting a regulatory framework that will make the goal of connected vehicles possible by 2020, Control, embedded systems, a... The National Highway Traffic Safety Administration in the US and the European Commission are drafting a regulatory framework that will make the goal of connected vehicles possible by 2020, Control, embedded systems, and communication technologies have devel- oped over the past 10 plus years and are approaching maturity. These will spark a revolution in how we approach driving. Cars will no longer need human drivers; they will be connected and exchange information about navigation, road hazards, traffic conditions, and safety. Travelers will be connected more than ever. Today' s car will become tomorrow' s office and the act of driving will become a leisure activity rather than a necessity. The emerging Internet of Vehicle enables application scenarios unimaginable just few years ago. The main challenges are Internet access spectrum scarcity, mobility, intermittent connectivity and scalability. In this article, we discuss the evolution from intelligent vehicle grid to autonomous, internet-conneeted vehicles and vehicular cloud. 展开更多
关键词 connected vehicles Internet of Vehicles name data networking
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部