Showing 1,121 - 1,140 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 1121
  2. 1122

    An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers by Mauricio Zapateiro De la Hoz, Leonardo Acho, Yolanda Vidal

    Published 2015-01-01
    “…Security and secrecy are some of the important concerns in the communications world. …”
    Get full text
    Article
  3. 1123

    A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges by Donagani Ramakrishna, Mohammed Ali Shaik

    Published 2025-01-01
    “…To analyze the efficiency of these algorithms, a comparative study was conducted using crucial factors, including security, secrecy, and integrity. The assessment also examines known flaws and prospective attacks for each algorithm and highlights current methods and future research gaps. …”
    Get full text
    Article
  4. 1124
  5. 1125
  6. 1126
  7. 1127
  8. 1128
  9. 1129
  10. 1130
  11. 1131
  12. 1132
  13. 1133
  14. 1134

    Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher by Zezhou HOU, Jiongjiong REN, Shaozhen CHEN

    Published 2023-04-01
    “…The neural distinguisher is a new tool widely used in crypto analysis of some ciphers.For SIMON-like block ciphers, there are multiple choices for their parameters, but the reasons for designer’s selection remain unexplained.Using neural distinguishers, the security of the parameters (a,b,c) of the SIMON-like with a block size of 32 bits was researched, and good choices of parameters were given.Firstly, using the idea of affine equivalence class proposed by Kölbl et al.in CRYPTO2015, these parameters can be divided into 509 classes.And 240 classes which satisfied gcd(a-b,2)=1 were mainly researched.Then a SAT/SMT model was built to help searching differential characteristics for each equivalent class.From these models, the optimal differential characteristics of SIMON-like was obtained.Using these input differences of optimal differential characteristics, the neural distinguishers were trained for the representative of each equivalence class, and the accuracy of the distinguishers was saved.It was found that 20 optimal parameters given by Kölbl et al.cannot make the neural distinguishers the lowest accuracy.On the contrary, there were 4 parameters, whose accuracy exceeds 80%.Furthermore, the 4 parameters were bad while facing neural distinguishers.Finally, comprehensively considering the choice of Kölbl et al.and the accuracy of different neural distinguishers, three good parameters, namely (6,11,1),(1,8,3), and(6,7,5) were given.…”
    Get full text
    Article
  15. 1135
  16. 1136
  17. 1137

    TURKEY’S SEARCH FOR SECURITY AND THE SOVIET FACTOR DURİNG THE SECOND WORLD W AR by Şaban Çalış

    Published 2014-05-01
    Subjects: “…turkey’s search ;for security ; the soviet factor duri̇ng the second world w ar…”
    Get full text
    Article
  18. 1138
  19. 1139
  20. 1140

    DYSSS: A Dynamic and Context-Aware Security System for Shared Sensor Networks by Claudio M. de Farias, Luci Pirmez, Luiz F. R. C. Carmo, Davidson Boccardo, Flávia C. Delicato, Igor L. dos Santos, Renato Pinheiro, Rafael O. Costa

    Published 2015-11-01
    “…In this work we propose a Dynamic Security System to be applied in the shared sensor network context. …”
    Get full text
    Article