304 research outputs found
Linked System of Data Organization and Management
This article presents a new method of cryptographic data encryption. The principle of operation consists of processing input data—changing the structure in a keyless format. There are a sufficient number of similar algorithms, which have the names symmetric and asymmetric. They work with keys for encryption or decryption. The new method will make it possible to process data according to the appropriate algorithm without changing the size of the input data, only by changing the structure, and also without using a key for decryption. For decryption, you need to apply the proposed algorithm in the reverse order. Currently, communication systems are gaining popularity, because society wants to maintain contact with others remotely, as well as with the security of personal data. The data loss of some systems has been noticed repeatedly, so in addition to displaying the new algorithm, the principle of data organization and management, which is called a “Linked System”, will be displayed. A significant number of systems are closed. They use other methods to keep data confidential. In addition to saving data, data may also be transferred. Transmission is carried out through communication channels, namely certain protocols. Some systems use special communication protocols to connect clients to the server. Each protocol can have a different data structure. The principle of application of the algorithm does not depend on the very structure of the system on which the corresponding protocol works. The algorithm is applied to all data that can be transmitted over the network mesh to which the clients are connected. Thanks to the individual approach, it is possible to achieve data reliability, as well as avoid the use of device resources thanks to an optimized algorithm and some software development tools
Evaluación de técnicas de cifrado para el intercambio de datos en internet de las cosas en el ámbito de la salud
A nivel mundial, la cifra de cibernautas que al conectarse a Internet creció de 3.9
mil millones en el 2018 y crecerá en 2023 a 5.3 millones. Otro concepto valioso es
que Internet de las cosas permitirá a las personas usar los servicios de conexión
por medio de dispositivos IoT, en dónde la asistencia médica tendrá menor
intensidad laboral y costo operacional logrando así la automatización de
dispositivos médicos conectados y el manejo de teléfonos inteligentes, así como
también el uso de software que aceptará realizar pruebas en pacientes de manera
más rápida y precisa. La seguridad de estos datos es una tarea desafiante; sin
embargo, se pueden mitigar con técnicas de cifrado de datos, siendo cruciales
cuando se trata de la autenticación de usuarios y la privacidad de los datos.
Quedando claro que, en el campo de ingeniería, se ha advertido que a lo largo de
los años estás técnicas presentan problemas de deficiencia en el intercambio de
datos, debido que con el auge de los dispositivos IoT y su gran interconexión genera
un gran número de amenazas y ataques. Por lo que en esta investigación se realizó
un proceso de verificación de artículos probados en el banco de datos IEE Xplore
y ProQuest, para la elección de técnicas de cifrado, después se identificó los
criterios de valoración de dichas técnicas de cifrado de datos en el cual se toman
factores de evaluación que son de mucha importancia e influyentes en la ejecución
de los algoritmos de cifrado, posteriormente se diseñó un escenario de pruebas
para evaluar las técnicas de cifrado de datos seleccionado, diseñando un escenario
de COVID-19 debido que con la pandemia se ha visto la dificultad de cómo proteger
los datos de los trabajadores, después se aplicó las técnicas de cifrado simétrica
(AES), asimétrica (SHA y RSA), por bloques(AES) e híbrida (SHA) y por último se
estimó los resultados alcanzados. Obteniendo como resultado que, en el campo de
la salud, la técnica más eficiente para el intercambio de datos es el cifrado Híbrido
(algoritmo SHA 256), ya que, al intercambiar los datos, es el cifrado más eficiente
en cuanto a tiempo de procesamiento total con un resultado de 0.00450016
segundos y rendimiento 0.276%, es decir que entre el tiempo de cifrado y
descifrado es la que realizó la tarea más velozmente.TesisInfraestructura, Tecnología y Medio Ambient
Security and Privacy for Modern Wireless Communication Systems
The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks
LIPIcs, Volume 261, ICALP 2023, Complete Volume
LIPIcs, Volume 261, ICALP 2023, Complete Volum
Undergraduate and Graduate Course Descriptions, 2023 Spring
Wright State University undergraduate and graduate course descriptions from Spring 2023
2023-2024 Boise State University Undergraduate Catalog
This catalog is primarily for and directed at students. However, it serves many audiences, such as high school counselors, academic advisors, and the public. In this catalog you will find an overview of Boise State University and information on admission, registration, grades, tuition and fees, financial aid, housing, student services, and other important policies and procedures. However, most of this catalog is devoted to describing the various programs and courses offered at Boise State
General Course Catalog [2022/23 academic year]
General Course Catalog, 2022/23 academic yearhttps://repository.stcloudstate.edu/undergencat/1134/thumbnail.jp
- …