Cryptography based techniques are used to secure confidential data from unauthorized access. These techniques are very good for the security and protection of the data but are …
N Jayapandian - Secure cyber-physical systems for smart cities, 2019 - igi-global.com
The main objective of this chapter is to discuss various security and privacy issues in smart cities. The development of smart cities involves both the private and public sectors. The …
P Maistri, P Vanhauwaert… - Workshop on Fault …, 2007 - ieeexplore.ieee.org
Several techniques have been proposed for encryption blocks in order to provide protection against faults. These techniques usually exploit some form of redundancy, eg by means of …
R Banu, T Vladimirova - Proceedings 40th Annual 2006 …, 2006 - ieeexplore.ieee.org
As satellite imaging payloads are providing more and more valuable and sensitive data the threat of unauthorized access to this data is also increasing. Therefore the demand to protect …
In today's world most of the communication is done using electronic media. Data Security plays a vital role in such communication. Hence, there is a need to protect data from …
CY Lee, CW Chiou, JM Lin - Journal of Electronic Testing, 2005 - Springer
The finite field is widely used in error-correcting codes and cryptography. Among its important arithmetic operations, multiplication is identified as the most important and …
P Maistri - 2011 IEEE 17th International On-Line Testing …, 2011 - ieeexplore.ieee.org
Hardware implementations of cryptographic systems are becoming common, due to new market needs and to reduced costs. However, the security of a system may be seriously …
D Liu, X Luo, Y Li, Z Shao, Y Guan - Journal of Systems Architecture, 2017 - Elsevier
Emerging non-volatile memory (NVM) has been considered as the most promising candidate of DRAM for future main memory design in mobile devices. NVM-based main …
NF Saudy, IA Ali, R Al Barkouky - Ain Shams Engineering Journal, 2019 - Elsevier
In this paper, a fault detection scheme is introduced with the ability to perform with increased protection and reliability of the Elliptic Curve Cryptography (ECC) in realistic environments at …