Results (2)
Search Parameters:
Keyword: Mobile securityHardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box
Advances in Science, Technology and Engineering Systems Journal,
Volume 10,
Issue 1,
Page # 37–47,
2025;
DOI: 10.25046/aj100105
Abstract:
Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…
Read More(This article belongs to the SP17 (Special Issue on Innovation in Computing, Engineering Science & Technology 2024-25) & Section Hardware & Architecture in Computer Science (CHA))
Strong Authentication Protocol based on Java Crypto Chip as a Secure Element
Advances in Science, Technology and Engineering Systems Journal,
Volume 1,
Issue 5,
Page # 21–26,
2016;
DOI: 10.25046/aj010505
Abstract:
Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509…
Read More(This article belongs to the Special issue on Recent Advances in Electrical and Electronics Engineering 2016 & Section Cybernetics in Computer Science (CCY))
