Results (2)
Search Parameters:
Keyword: ID-based encryptionMobile Money Wallet Attack Resistance using ID-based Signcryption Cryptosystem with Equality Test
Advances in Science, Technology and Engineering Systems Journal,
Volume 5,
Issue 6,
Page # 988–994,
2020;
DOI: 10.25046/aj0506118
Abstract:
This paper is an extension of a research work presented at ICSIoT 2019. An attack continuum against the insider attack in mobile money security in Ghana using a witness based crypto- graphic method proposed by Alornyo et al. resisted the service provider from peddling with users data for economic gains. Our improved scheme achieves a…
Read More(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Fast Stream Cipher based Chaos Neural Network for Data Security in CAN Bus
Advances in Science, Technology and Engineering Systems Journal,
Volume 5,
Issue 5,
Page # 63–68,
2020;
DOI: 10.25046/aj050509
Abstract:
Vehicle systems are controlled by embedded electronic devices called electronic control units (ECUs). These ECUs are connected together with network protocols. The Controller Area Network (CAN) protocol is widely implemented due to its high fault tolerance. However, the CAN is a serial broadcast bus, and it has no protection against security threats. In this paper,…
Read More(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
