Physical layer security: Authentication, integrity, and confidentiality

M Shakiba-Herfeh, A Chorti, H Vincent Poor - Physical Layer Security, 2021 - Springer
… and deliver authentication, confidentiality, message integrity, and privacy in demanding …
security operations: node authentication, message integrity, and message confidentiality as …

Data confidentiality, integrity, and authentication

D Senthilkumar - Research Anthology on Blockchain Technology in …, 2021 - igi-global.com
… , and privacy and access control lists technologies. The authentication provider authenticates
… This key-pair is used in the transport layer security with the entire network. The network …

Data authentication, integrity and confidentiality mechanisms for federated satellite systems

O von Maurich, A Golkar - Acta Astronautica, 2018 - Elsevier
… , data authentication, integrity and confidentiality could respond to federated satellite systems'
security … : for example, the protocols used in Transport Layer Security (TLS) and IPSEC are …

Physical layer security for the Internet of Things: Authentication and key generation

J Zhang, S Rajendran, Z Sun… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
Authentication verifies the user’s identity and prevents malicious users from accessing the
network, while secure transmission protects data integrity and confidentiality using encryption …

Review on confidentiality, integrity and availability in information security

CK Yee, MF Zolkipli - Journal of ICT in Education, 2021 - ojs.upsi.edu.my
security and the requirements of information security. The … Security issues are analyzed in
the recent methodologies. … in each information security requirement is at a moderate level. It is …

Single-level integrity and confidentiality protection for distributed shared memory multiprocessors

B Rogers, C Yan, S Chhabra… - 2008 IEEE 14th …, 2008 - ieeexplore.ieee.org
… Before we present our solution for ensuring data confidentiality and integrity in DSM systems
(Section 4), we discuss the types of attacks that we assume possible in a DSM system. Our …

[HTML][HTML] Security, privacy, and confidentiality issues on the Internet

G Kelly, B McKenzie - Journal of Medical Internet Research, 2002 - jmir.org
… is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There
… envelope to maintain its integrity and privacy. This is precisely what cryptography can do. …

Perception layer security in Internet of Things

HA Khattak, MA Shah, S Khan, I Ali, M Imran - Future Generation Computer …, 2019 - Elsevier
… -layered security, we focus on two key enabling technologies (ie, RFID and sensor network)
at the perception layer. … at rest and in motion, confidentiality, integrity, and availability (CIA) …

Secure transfer of medical images using hybrid encryption: Authentication, confidentiality, integrity

BM Belkaid, L Mourad, C Mehdi… - … on Computer Vision and …, 2015 - ieeexplore.ieee.org
… for message confidentiality, message authentication and key exchange using transport
layer security. This paper presents a new encryption system for secure medical images …

An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks

M Azees, P Vijayakumar, M Karuppiah, A Nayyar - Wireless Networks, 2021 - Springer
level of confidentiality with smaller key size compared to existing encryption techniques. The
security … include anonymous authentication, data integrity and data confidentiality. In practice…