Search results for "Encryption"

showing 10 items of 94 documents

Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127

2014

International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…

[ INFO ] Computer Science [cs]security protocolsComputer sciencedata acquisition[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]020209 energy[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Cryptography02 engineering and technologysemantic security blockLibrary and Information SciencesComputer securitycomputer.software_genreSOAP protocolSecurity information and event management[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SCADAModbus protocolECC cryptography0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]SCADAcontrol systemsCloud computing securityvulnerabilitiesTOMSONbusiness.industryencryption technologyembedded applicationscyber securitysupervisory controlsemantic attacksCryptographic protocolComputer security modelsecurity ontologyComputer Science ApplicationsOSI modellow latencySecurity service020201 artificial intelligence & image processingbusinesscomputerInformation SystemsComputer network
researchProduct

Image Encryption/Decryption system based on an oscillatory cellular nonlinear network

2008

International audience

[ INFO.INFO-TS ] Computer Science [cs]/Signal and Image Processing[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing[INFO.INFO-TS] Computer Science [cs]/Signal and Image Processing[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processingimage encryption[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingComputingMilieux_MISCELLANEOUSnon linear dynamics[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processing
researchProduct

Trusted Computing and DRM

2015

Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of attacks or very complex such as machine learning and detecting anomalies in the usage pattern of the remote user). Another branch of attacks requires protection by the system owner against internal users. …

business.industryComputer scienceCloud computingTrusted ComputingAttack surfaceConditional accessComputer securitycomputer.software_genreDigital mediaDisk encryptionDirect Anonymous AttestationTrusted Platform Modulebusinesscomputer
researchProduct

AES/FPGA Encryption Module Integration for Satellite Remote Sensing Systems: LST-SW case

2020

Satellite remote sensing embedded systems need to be secure to protect data transmission between satellites and the ground station for any threat can affects the hardware of satellite and interception of data, in addition to unauthorized access to satellite system. This research proposes an approach for a secure integration of FPGA Encryption module based on the iterative looping architecture for remote sensing algorithm and especially for the LST-SW algorithm. The target hardware used in this paper is Virtex-5 XC5VLX50T FPGA from Xilinx. Hardware Description Language was used to design the complete system. The analysis of the proposed designed shows that this implementation can achieved a …

business.industryComputer scienceHardware description languageSatellite systemEncryptionSatellitebusinessField-programmable gate arrayThroughput (business)computerComputer hardwareData transmissionBlock (data storage)computer.programming_language2020 3rd International Conference on Advanced Communication Technologies and Networking (CommNet)
researchProduct

Robustly correlated key‐medical image for DNA‐chaos based encryption

2021

Abstract Medical images include confidential and sensitive information about patients. Hence, ensuring the security of these images is a crucial requirement. This paper proposes an efficient and secure medical image encryption‐decryption scheme based on deoxyribonucleic acid (DNA), one‐dimensional chaotic maps (tent and logistic maps), and hash functions (SHA‐256 and MD5). The first part of the proposed scheme is the key generation based on the hash functions of the image and its metadata. The key then is highly related and intensely sensitive to the original image. The second part is the rotation and permutation of the first two MSB bit‐plans of the medical image to reduce its black backgr…

business.industryComputer sciencePattern recognitionEncryptionImage (mathematics)CHAOS (operating system)QA76.75-76.765Signal ProcessingPhotographyKey (cryptography)Computer softwareComputer Vision and Pattern RecognitionArtificial intelligenceElectrical and Electronic EngineeringTR1-1050businessSoftwareIET Image Processing
researchProduct

Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks

2017

With the emergence of cloud computing, many attacks, including Distributed Denial-of-Service (DDoS) attacks, have changed their direction towards cloud environment. In particular, DDoS attacks have changed in scale, methods, and targets and become more complex by using advantages provided by cloud computing. Modern cloud computing environments can benefit from moving towards Software-Defined Networking (SDN) technology, which allows network engineers and administrators to respond quickly to the changing business requirements. In this paper, we propose an approach for detecting application-layer DDoS attacks in cloud environment with SDN. The algorithm is applied to statistics extracted from…

business.industryComputer scienceProbabilistic logic020206 networking & telecommunicationsDenial-of-service attackCloud computing02 engineering and technologyEncryptionApplication layeranomaly detectionDDoS attackSDNprobabilistic model0202 electrical engineering electronic engineering information engineeringbehavior pattern020201 artificial intelligence & image processingAnomaly detectionCluster analysisbusinessSoftware-defined networkingComputer networkclustering
researchProduct

Adopting encryption to protect confidential data in public clouds: A review of solutions, implementation challenges and alternatives

2015

A shift towards use of public cloud services is ongoing and more and more enterprises will start to use them in the near future. As public cloud services certainly promise to deliver many benefits, this new way of delivering services also introduces new types of risks. Due to the NSA’s surveillance programs, non-US enterprises need to reassess the risks of public cloud services provided by US companies and look for available solutions to protect their confidential data transferred and stored in the cloud. Encryption is seen as a solution to help enterprises full fill the requirements related to security and privacy, but is often challenging to implement. Encryption has its own security prob…

confidential datapublic cloudspilvipalveluttrustworthysalauscyber espionageluottamuksellisuusdata encryptiontietoturva
researchProduct

Ramses: A visual steganographic system

2007

data encryption non-photorealistic rendering
researchProduct

A general framework for group authentication and key exchange protocols

2014

Published version of a chapter in the book: Foundations and Practice of Security. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-319-05302-8_3 In this paper, we propose a novel framework for group authentication and key exchange protocols. There are three main advantages of our framework. First, it is a general one, where different cryptographic primitives can be used for different applications. Second, it works in a one-to-multiple mode, where a party can authenticate several parties mutually. Last, it can provide several security features, such as protection against passive adversaries and impersonate attacks, implicit key authentication, forward and backward securi…

group authenticationAuthenticationPost-quantum cryptographyelliptic curve discrete logarithm problemCryptographic primitivediscrete logarithm problembusiness.industryVDP::Technology: 500::Information and communication technology: 550Computer securitycomputer.software_genreKey authenticationDiffie–Hellman key exchangePublic-key cryptographyDiffie-Hellman key exchangebusinesscomputerKey exchangeElGamal encryptionMathematics
researchProduct

Requirements for Energy Efficient Edge Computing: A Survey

2018

Internet of Things is evolving heavily in these times. One of the major obstacle is energy consumption in the IoT devices (sensor nodes and wireless gateways). The IoT devices are often battery powered wireless devices and thus reducing the energy consumption in these devices is essential to lengthen the lifetime of the device without battery change. It is possible to lengthen battery lifetime by efficient but lightweight sensor data analysis in close proximity of the sensor. Performing part of the sensor data analysis in the end device can reduce the amount of data needed to transmit wirelessly. Transmitting data wirelessly is very energy consuming task. At the same time, the privacy and s…

hajautetut järjestelmätBattery (electricity)energiatehokkuusbusiness.industryComputer science020206 networking & telecommunications020207 software engineering02 engineering and technologyEnergy consumptionEncryptionedge computing0202 electrical engineering electronic engineering information engineeringWirelessEnhanced Data Rates for GSM EvolutionbusinessEnergy (signal processing)Edge computingComputer networkEfficient energy use
researchProduct