secured communication
Recently Published Documents


TOTAL DOCUMENTS

135
(FIVE YEARS 54)

H-INDEX

6
(FIVE YEARS 2)

2021 ◽  
Vol 7 (2) ◽  
pp. 172-187
Author(s):  
Donald D. Kim

In remote villages without access to modern IT technology, simple devices such as smartcards can be used to carry out business transactions. These devices typically store multiple business applications from multiple vendors. Although devices must prevent malicious or accidental security breaches among the applications, a secure communication channel between two applications from different vendors is often required. In this paper, first, we propose a method of establishing secure communication channels between applications in embedded operating systems that run on multi-applet smart cards. Second, we enforce the high assurance using an intransitive noninterference security policy. Thirdly, we formalize the method through the Z language and create the formal specification of the proposed secure system. Finally, we verify its correctness using Rushby's unwinding theorem.


2021 ◽  
Vol 106 ◽  
pp. 104478
Author(s):  
Arindam Sarkar ◽  
Mohammad Zubair Khan ◽  
Abdulfattah Noorwali

2021 ◽  
pp. 309-319
Author(s):  
Paul Joan Ezra ◽  
Sanjay Misra ◽  
Akshat Agrawal ◽  
Jonathan Oluranti ◽  
Rytis Maskeliunas ◽  
...  

2021 ◽  
Vol 22 (4) ◽  
pp. 803-810
Author(s):  
John Blesswin A. John Blesswin A. ◽  
Selva Mary G. John Blesswin A. ◽  
Manoj Kumar S. Selva Mary G.


2021 ◽  
Author(s):  
Xiaoyi Wang ◽  
Christophe Caloz

This paper presents a novel class of (space)time-modulated metasurfaces, namely (space)time metasurfaces that are modulated by pseudo-random sequence (PRS) waveforms. In contrast to their harmonically or quasi-harmonically modulated counterparts, these metasurfaces massively alter the temporal spectrum of the waves that they process; as a result, they exhibit distinct properties and offer complementary applications. These metasurfaces are assumed here to operate in the `slow-modulation' regime, where the fixed-state time between state-transition is much larger than the transient time associated with the dispersion of the media involved, which allows safe separation of the time-variance and frequency-dispersive effects of the system. Thanks to the special properties of their modulation, which are generally assumed to have a staircase shape and to be periodic in addition to being pseudo-random, the PRS (space)time-modulated metasurfaces can perform a number of unique operations, such as spectrum spreading, interference suppression, and row/cell selection. These properties, combined with modern microwave CMOS technologies, lead to applications with unique performance or/and features, such as electromagnetic stealth, secured communication, direction of arrival estimation, and spatial multiplexing.


2021 ◽  
Vol 7 ◽  
pp. e566
Author(s):  
Mohd Majid Akhtar ◽  
Mohammad Zubair Khan ◽  
Mohd Abdul Ahad ◽  
Abdulfattah Noorwali ◽  
Danish Raza Rizvi ◽  
...  

Background Consumer electronics or daily use home appliances are the basic necessity of every household. With the adoption of IoT in consumer electronics, this industry is set to rise exponentially. In recent times, the demand for consumer electronics rises amidst the pandemic due to a paradigm shift from in-office culture to work from home. Despite intelligent IoT devices, smart home configuration, and appliances at our disposal, the rudimentary client-server architecture fails to provide facilities like full access control of data and devices, transparency, secured communication, and synchronization between multiple devices, etc. to the users. Methods To overcome these limitations, Blockchain technology has been adopted in recent years, however, it has its own set of limitations in its widespread implementation. Hence, we propose a methodology using the IOTA platform, a distributed ledger technology (DLT) for secured communication between consumer electronics devices and appliances. Results The implementation provides access control, interoperability, data storage, and management with an exploratory insight towards a decentralized micro-payment use-case between Electric cars and charging stations.


Author(s):  
Chirag Sharma ◽  
Aman Kumar* ◽  
Akancha Sinha ◽  
Meraj Ahmad

In this era where everything is becoming digital the most challenging topic in front of us is Data Security in every aspect even in the secured communication channel. These issues can be tackled by using strong Data Encryption and the trusted third party who maintains the database. The fast development in Digital Technology also comes with the rapid crimes and the insecurity of data theft. From time to time engineers came up with many encryption techniques like Caser Ciphers, Vernam Ciphers, Vigenère Cipher which helped us in securing the data but with lots of flaws that later were exploited by the cybercriminals. So, they cannot provide sufficient security. In this research paper, we have proposed a new, more efficient encryption algorithm. This algorithm will use multiple keys during encryption or decryption so it will be very less vulnerable against the attacks like Brute force.


Sign in / Sign up

Export Citation Format

Share Document