The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud Computing is in widespread use today because of its many benefits. One of the early concerns was security and it has been shown in multiple studies that cloud security is significantly enhanced by the use of cloud service. Organizations are able to enhance security because of the advanced features that a cloud service provider is able to provide. The availability of high-end resources for all...
A multi-mode Secure Hashing Algorithm (SHA) accelerator is fabricated in 45nm CMOS and occupies 0.0625mm2 with 18Gbps throughput and total power consumption of 50mW. The reconfigurable hardware accelerator computes SHA-1/224/256/384/512 message-digest using unified SHA bit-slices and configurable compression circuits resulting in 40% area reduction and <;3% performance overhead for reconfiguration...
In this paper we consider the problem of how entities operating under distinct roots of trust in a coalition environment can flexibly and securely communicate with one another. We consider the identity-based setting, with each entity being pre-configured with a private key from a particular trusted authority (TA), but where multiple, independent TAs are involved in the coalition. Our solution to the...
Image compression and image encryption are pivotal to proper storage and transmission of images. Simultaneous image compression and encryption aims at achieving enhanced bandwidth utilization and security at the same time. The proposed number theory based image compression encryption (NTICE) algorithm employs number theoretic paradigm-Chinese remainder theorem, to solve congruencies and hence realize...
Mobile ad hoc networks are infrastructure-free, pervasive, ubiquitous and without any centralized authority. These unique characteristics, combined with security threats, demand solutions for securing ad hoc networks prior to their deployment in commercial and military applications. So far, the research in mobile ad hoc network has been primarily focused on routing and mobility aspects rather than...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.