Search Results

Results (67)

Search Parameters:

Keyword: Secure
Order results
Results per page
Open AccessArticle
8 Pages, 671 KB Download PDF

Analysis of Information Security for a Voting Process for Sectional Governments in Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 352–359, 2019; DOI: 10.25046/aj040546
Abstract:

Knowing about different events in several Latin American countries, as well as in Ecuador, in relation to data alteration, in the different sectional voting processes, it has been necessary to carry out a security analysis provided by the systems of choice in the different sectional governments of the country. The objective of this study is…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 725 KB Download PDF

Proposal for a Security Model for a Popular Voting System Process in Latin America

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 53–60, 2019; DOI: 10.25046/aj040507
Abstract:

In Latin America, there is a need for better security systems in different national or sectional votes, which is why this study was carried out, to show a proposal for a security model that helps to obtain better results and to this purpose has been selected information on the database for different Latin American countries,…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
13 Pages, 811 KB Download PDF

Computer Security as an Engineering Practice: A System Engineering Discussion

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 357–369, 2019; DOI: 10.25046/aj040245
Abstract:

We examine design principles from more than 20 years of experience in the implementation and protection of mission critical flight systems used by the Mission Design and Navigation Section at NASA’s Jet Propulsion Laboratory. Spacecraft navigation has rigorous requirements for completeness and accuracy, often under critical and uncompromising time pressure. Fault tolerant and robust design…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 700 KB Download PDF

Application Layer Security Authentication Protocols for the Internet of Things: A Survey

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 317–328, 2019; DOI: 10.25046/aj040131
Abstract:

Network security challenges due to nearly limitless internet connectivity, platform limitations, ubiquitous nodal mobility and huge data transactions is burgeoning by the day and the need for transcend Internet of Things (IoT) based cloud security authentication protocols is on an exponential rise. Even though many secure classic layered security mechanisms are available for implementation, they…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
23 Pages, 28,936 KB Download PDF

Extending the Life of Legacy Robots: MDS-Ach via x-Ach

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 50–72, 2019; DOI: 10.25046/aj040107
Abstract:

Our work demonstrates how to use contemporary software tools on older or “legacy” robots while keeping compatibility with the original control, tools, and calibration procedures. This is done by implementing a lightweight middle-ware called MDS-Ach connected directly to the hardware communications layer of the robot’s control system. The MDS-Ach middle-ware, which relies on the x-Ach…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Robotics (ROB))
Open AccessArticle
10 Pages, 921 KB Download PDF

Protecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 311–320, 2018; DOI: 10.25046/aj030537
Abstract:

Nowadays, many companies and organizations use various encryption techniques to secure their private data before send it through the unsecure network. However, many attackers try to store private data by using various attacks. Most of the organizations use password based encryption algorithm (PBE) to protect their private data. However, the existing PBE methods are vulnerable…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 881 KB Download PDF

EAES: Extended Advanced Encryption Standard with Extended Security

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 3, Page # 51–56, 2018; DOI: 10.25046/aj030307
Abstract:

Though AES is the highest secure symmetric cipher at present, many attacks are now effective against AES too which is seen from the review of recent attacks of AES. This paper describes an extended AES algorithm with key sizes of 256, 384 and 512 bits with round numbers of 10, 12 and 14 respectively. Data…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 791 KB Download PDF

Security Analysis and the Contribution of UPFC for Improving Voltage Stability

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 404–411, 2018; DOI: 10.25046/aj030149
Abstract:

The occurrence of many failures in the power system can lead to power instability and affects the system parameters to go beyond its operating limits. It may lead to obstructing the secure operations and reliability of power systems. Ensuring power system security needs proper actions to be taken for the undesirable contingency. Thus, security analysis…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Electrical Engineering (ELE))
Open AccessArticle
13 Pages, 1,427 KB Download PDF

Algorithms for Technical Integration of Virtual Power Plants into German System Operation

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 135–147, 2018; DOI: 10.25046/aj030117
Abstract:

This paper critically evaluates the operational perspective of Virtual Power Plants (VPP) in Germany by analyzing key factors to replace conventional power plants in the future power system. Therefore, its necessity for the secure operation as well as the technical and economic benefits for the German power system are pointed out. The single sections describe…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Electrical Engineering (ELE))
Open AccessArticle
5 Pages, 744 KB Download PDF

Virtual Memory Introspection Framework for Cyber Threat Detection in Virtual Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 25–29, 2018; DOI: 10.25046/aj030104
Abstract:

In today’s information based world, it is increasingly important to safeguard the data owned by any organization, be it intellectual property or personal information. With ever increasing sophistication of malware, it is imperative to come up with an automated and advanced methods of attack vector recognition and isolation. Existing methods are not dynamic enough to…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 882 KB Download PDF

Review on security issues in RFID systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 194–202, 2017; DOI: 10.25046/aj020624
Abstract:

Radio frequency Identification (RFID) is currently considered as one of the most used technologies for an automatic identification of objects or people. Based on a combination of tags and readers, RFID technology has widely been applied in various areas including supply chain, production and traffic control systems. However, despite of its numerous advantages, the technology…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 637 KB Download PDF

Source Code Vulnerabilities in IoT Software Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1502–1507, 2017; DOI: 10.25046/aj0203188
Abstract:

An empirical study that examines the usage of known vulnerable statements in software systems developed in C/C++ and used for IoT is presented. The study is conducted on 18 open source systems comprised of millions of lines of code and containing thousands of files. Static analysis methods are applied to each system to determine the…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 1,017 KB Download PDF

Autonomous Micro-Air-Vehicle Control Based on Visual Sensing for Odor Source Localization

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1152–1158, 2017; DOI: 10.25046/aj0203145
Abstract:

In this paper, we propose a novel control method for autonomous-odor-source localization using visual and odor sensing by micro air vehicles (MAVs). Our method is based on biomimetics, which enable highly autonomous localization. Our method does not need any instruction signals, including even global positioning system (GPS) signals. An experimenter simply blows a whistle, and…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Automation & Control Systems (ACS))
Open AccessArticle
9 Pages, 1,303 KB Download PDF

Collaborative Encryption Algorithm Between Vigenere Cipher, Rotation of Matrix (ROM), and One Time Pad (OTP) Algoritma

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 13–21, 2017; DOI: 10.25046/aj020503
Abstract:

Cryptography is still developing today. Classical cryptography is still in great demand for research and development. Some of them are Vigenere Cipher and One Time Pad (OTP) Algorithm. Vigenere Cipher is known as the alphabet table used to encrypt messages. While OTP is often used because it is still difficult to solve. Currently there are…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 702 KB Download PDF

Toward Confirming a Framework for Securing the Virtual Machine Image in Cloud Computing

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 44–50, 2017; DOI: 10.25046/aj020406
Abstract:

The concept of cloud computing has arisen thanks to academic work in the fields of utility computing, distributed computing, virtualisation, and web services. By using cloud computing, which can be accessed from anywhere, newly-launched businesses can minimise their start-up costs. Among the most important notions when it comes to the construction of cloud computing is…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
15 Pages, 1,137 KB Download PDF

Privacy-by-Design (PbD) IoT Framework : A Case of Location Privacy Mitigation Strategies for Near Field Communication (NFC) Tag Sensor

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 134–148, 2017; DOI: 10.25046/aj020116
Abstract:

Near Field Communication (NFC) technology is a short range (range about 10cm) standard extended from the core standard Radio Frequency Identifier (RFID). These technologies are a portion of wireless communication technology. Even though NFC technologies benefit in various field, but it’s still exposed to multiple type of privacy attacks and threat as well since the…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Telecommunications (TEL))
Open AccessArticle
11 Pages, 872 KB Download PDF

Cross layers security approach via an implementation of data privacy and by authentication mechanism for mobile WSNs

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 97–107, 2017; DOI: 10.25046/aj020112
Abstract:

To implement a new secure network with high mobility and low energy consumption, we use smart sensors. These sensors are powered by micro batteries generally non rechargeable. So, to extend their lifetime, it is necessary to implement new energy conservation techniques. Existing works separate the two features (security, energy conservation) and are interested specifically in…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Network Engineering (ENW))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Indigenous Knowledge Systems of the Tribal Communities of the Asia Pacific
Guest Editors: Dr. Anurag Hazarika
Deadline: 31 October 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026