Filters








54 Hits in 4.0 sec

Implementing Cryptography on TFT Technology for Secure Display Applications [chapter]

Petros Oikonomakos, Jacques Fournier, Simon Moore
2006 Lecture Notes in Computer Science  
We have embarked on a project to implement cryptographic algorithms on polysilicon TFT technology.  ...  Our prototype designs will pave the way for secure display realisations combining cryptographic circuits and conventional pixel drivers on the same substrate.  ...  The authors would also like to thank Simon Hollis for his useful input during the planning phase of this work, and Ross Anderson for his comments on the paper.  ... 
doi:10.1007/11733447_3 fatcat:ml6sa2noqbbt7cbloyz7egaks4

Hardware Implementation of Hybrid Model Encryption Algorithm for Secure Transmission of Medical Images

2019 International Journal of Engineering and Advanced Technology  
For making secure transmission of medical images the best solution is cryptography algorithm.  ...  The same hybrid model encryption may implement in real time application using FPGA device.  ...  INTRODUCTION Rapid growth of communication technologies, security and confidentiality has become one of the main concerns for avoid security issues.  ... 
doi:10.35940/ijeat.a1042.1091s19 fatcat:4drpcky76nfe3nuj7unl675jqu

A brief experience on journey through hardware developments for image processing and its applications on Cryptography [article]

Sangeet Saha, Chandrajit pal, Rourab paul, Satyabrata Maity, Suman Sau
2012 arXiv   pre-print
The importance of embedded applications on image and video processing,communication and cryptography domain has been taking a larger space in current research era.  ...  Specifically we would like to elaborate our experience on the significance of computer vision as one of the domains where hardware implemented algorithms perform far better than those implemented through  ...  (DST, Govt of India) for all kinds of support and encouragement to carry out this research work.  ... 
arXiv:1212.6303v1 fatcat:4zzzgfvdxrdtllulbu4c3abv2i

The Hardware Design and Implementation of a New Ultra Lightweight Block Cipher
새로운 초경량 블록 암호의 하드웨어 설계 및 구현

A.N. Gookyi Dennis, Seungyong Park, Kwangki Ryoo
2016 Journal of the Institute of Electronics and Information Engineers  
The cipher is implemented on iNEXT-V6 board equipped with virtex-6 FPGA. The design synthesized to 196 slices at 337 MHz maximum clock frequency.  ...  With the growing trend of pervasive computing, (the idea that technology is moving beyond personal computers to everyday devices) there is a growing demand for lightweight ciphers to safeguard data in  ...  The original image, encrypted image and decrypted image take turns to be displayed on the TFT LCD of the iNEXT-V6 test board. The image displayed on the TFT LCD is shown in Fig. 8.  ... 
doi:10.5573/ieie.2016.53.10.103 fatcat:kbazuxdytfbedbpdnnz5z2rfuu

A New Simple Chaotic Lorenz-Type System and Its Digital Realization Using a TFT Touch-Screen Display Embedded System

Rodrigo Méndez-Ramírez, Adrian Arellano-Delgado, César Cruz-Hernández, Rigoberto Martínez-Clark
2017 Complexity  
Finally, the DV of NCS was implemented, in real-time, by using a novel embedded system (ES) Mikromedia Plus for PIC32MX7 that includes one microcontroller PIC32 and one thin film transistor touch-screen  ...  display (TFTTSD), together with external digital-to-analog converters (DACs).  ...  By having a graphical interface and given certain potential applications in the engineering field, such as biometric systems, telemedicine, cryptography, and secure communications, the proposed digital  ... 
doi:10.1155/2017/6820492 fatcat:qh3rwwvzczagjejd4kbvykcxby

Cipher Block Chaining Support Vector Machine for Secured Decentralized Cloud Enabled Intelligent IoT Architecture

Debabrata Samanta, Ahmed h. Alahmadi, M P Karthikeyan, Mohammad zubair Khan, Amit Banerjee, Goutam Kumar Dalapati, Seeram Ramakrishna
2021 IEEE Access  
To make the process more complex, the optimization techniques are taken into account for the key generation in descendant two methods application model that acts computationally more secure specifically  ...  The growth of internet era leads to a major transformation in a storage of data and accessing the applications. One such new trend that promises the endurance is the Cloud computing.  ...  The cryptography is broadly classified into two categories based on the key such as the Symmetric Key Cryptography and Asymmetric Key Cryptography.  ... 
doi:10.1109/access.2021.3095297 fatcat:u4s7iclnhfhvzmg5ym7fbejoge

The Prototype of Thai Blockchain-based Voting System

Krittaphas Wisessing, Phattaradon Ekthammabordee, Thattapon Surasak, Scott C.-H., Chakkrit Preuksakarn
2020 International Journal of Advanced Computer Science and Applications  
The web-application was developed to allow voters to vote. In addition, real-time voting results will be shown on the same website after election period has passed.  ...  In this paper, the prototype of Thai voting system using blockchain technology (B-VoT) has been successfully designed and developed.  ...  for the supportive idea and resources.  ... 
doi:10.14569/ijacsa.2020.0110510 fatcat:ap3a6szkm5bunns23iob5ilb64

Role of Technology in the Development of Smart and Secure Public Voting Systems – a Review of Literatures

Vinayachandra, Geetha Poornima K, Rajeshwari M, Krishna Prasad K
2020 Zenodo  
Utilizing technology in voting procedures can make it quicker, more efficient, and less susceptible to security breaches.  ...  Malevolent software can steal one candidate's votes and assign them to some other.  ...  For security tools, a new voting system is implemented with the Pallier cryptosystem and blind signature scheme built on RSA.  ... 
doi:10.5281/zenodo.3934439 fatcat:5occqzwmlbd7hmihhf2e4mnxti

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices

Helena Rifà-Pous, Jordi Herrera-Joancomartí
2011 Future Internet  
Cryptographic algorithms are required for developing security solutions that protect network activity.  ...  In this paper, we perform a wide analysis on the expenses of launching symmetric and asymmetric cryptographic algorithms, hash chain functions, elliptic curves cryptography and pairing based cryptography  ...  Time delays have been measured through the implementation of temporal monitors in test applications.  ... 
doi:10.3390/fi3010031 fatcat:yay25oqaabaizes7dchw6ziglu

Ontology-Based Cyber Security Policy Implementation in Saudi Arabia

Amir Mohamed Talib, Fahad Omar Alomary, Hanan Fouad Alwadi, Rawan Rashed Albusayli
2018 Journal of Information Security  
This paper displays on contemporary studies done in Saudi Arabia in regards to cyber security policy coverage.  ...  One of these initiatives is the development and implementation of a Saudi Arabia precise cyber security policy.  ...  The ontology based on cyber security policy is implemented using "Protégé", which is a free and an open source platform that implement a suitable tool constructs knowledge based models and applications  ... 
doi:10.4236/jis.2018.94021 fatcat:h7soybhryjfnrpbjvjz2o3woyi

Implementation and Commercialization of the Results of the "Multidisciplinary Mobile Computer Classroom Based on Raspberry Pi" Project

Aizhan Zharkimbekova, Ademi Ospanova, Kakim Sagindykov, Makhabbat Kokkoz
2020 International Journal of Emerging Technologies in Learning (iJET)  
This paper describes the developed technology for using the Raspberry Pi micro-computer to teach practical skills on computer networks and operating systems.  ...  In terms of commercialization, the calculations were carried out on the costs of organizing a computer class based on the Raspberry Pi: implementation of the developed technology; the effectiveness of  ...  costs were given; • Technological plan for the implementation of the subproject was developed; • An initiative report on the existing backlog was prepared: ─ Examples of using the projects and applications  ... 
doi:10.3991/ijet.v15i13.14665 fatcat:oq5rtsoqsbdjfhkgksmrsxzcfe

Improved Security Based on Combined Encryption and Steganography Techniques

Stefan MOCANU, Andrei DULUTA, Daniel MEREZEANU, Radu PIETRARU
2017 Studies in Informatics and Control  
For some people a science, for other people just an art, steganography is in fact an ancient method of embedding a message into an apparently uninteresting carrier.  ...  While encryption scrambles the message based on a certain algorithm so it can't be understood by anyone that does not hold the unscrambling key, steganography works on hiding the message without the need  ...  The main goal of this paper is to propose a robust and secure method of communication based on a combination of steganography with a light form of cryptography.  ... 
doi:10.24846/v26i1y201713 fatcat:aqalo2od7jghzbudxnsmq5mfoi

U-mentalism Patent: The Beginning of Cinematic Supercomputation

Luís Homem
2021 International journal of Web & Semantic Technology  
This paper discloses in synthesis a super-computation computer architecture (CA) model, presently a provisional Patent Application at INPI (nº 116408).  ...  One such architecture depends on any "cell"-like exponential-prone basis such as the "pixel", or rather the RGB "octet-byte", limited as it may be, once it is congruent with any wave-particle duality principle  ...  In reality, beyond Thin Film Transistors ("active matrix" TFT), Liquid Crystal Display ("passive matrix" LCD), and Organic Light Emitting Diode (OLED), the transparent semiconducting oxides (TSOs) and  ... 
doi:10.5121/ijwest.2021.12101 fatcat:3rs6dcsqxjhlniqmqhh7qzeb4q

Continuous Deployment of Trustworthy Smart IoT Systems

Nicolas Ferry, Phu H. Nguyen, Hui Song, Erkuden Rios, Eider Iturbe, Satur Martinez, Angel Rego
2020 Journal of Object Technology  
A major challenge is the high heterogeneity of their infrastructure, which broadens the surface for security attacks and increases the complexity of maintaining and evolving such complex systems.  ...  More precisely, GeneSIS includes: (i) a domain specific modelling language to specify the deployment of SIS over IoT, Edge and Cloud infrastructure with the necessary concepts for security and privacy;  ...  The SmartDisplay.thingml is a ThingML program to display messages on the TFT LCD Arduino display. The Sensor Service is a NodeJS application that receives the temperature and humidity data.  ... 
doi:10.5381/jot.2020.19.2.a16 fatcat:2s43wrhgo5bpbf5rjnjpahaycu

A Meta-Analysis of Industrial Security Research for Sustainable Organizational Growth

Harang Yu, Hangbae Chang
2020 Sustainability  
This has led to an increased awareness of industrial security in both the business and academic spheres and a focus on identifying and implementing countermeasures against security incidents, as future  ...  This study first examines the literature on industrial security and its current status in South Korea, which is considered an active industrial security research environment.  ...  These increasing security threats have created the need for organizations to undertake industrial technology security activities against espionage, leading to the concurrent implementation of security  ... 
doi:10.3390/su12229526 fatcat:kzdiqnpus5hotf6ihcdpxy2qni
« Previous Showing results 1 — 15 out of 54 results