304 research outputs found

    Undergraduate Catalog of Studies, 2023-2024

    Get PDF

    Undergraduate Catalog of Studies, 2023-2024

    Get PDF

    Undergraduate Catalog of Studies, 2022-2023

    Get PDF

    Linked System of Data Organization and Management

    Get PDF
    This article presents a new method of cryptographic data encryption. The principle of operation consists of processing input data—changing the structure in a keyless format. There are a sufficient number of similar algorithms, which have the names symmetric and asymmetric. They work with keys for encryption or decryption. The new method will make it possible to process data according to the appropriate algorithm without changing the size of the input data, only by changing the structure, and also without using a key for decryption. For decryption, you need to apply the proposed algorithm in the reverse order. Currently, communication systems are gaining popularity, because society wants to maintain contact with others remotely, as well as with the security of personal data. The data loss of some systems has been noticed repeatedly, so in addition to displaying the new algorithm, the principle of data organization and management, which is called a “Linked System”, will be displayed. A significant number of systems are closed. They use other methods to keep data confidential. In addition to saving data, data may also be transferred. Transmission is carried out through communication channels, namely certain protocols. Some systems use special communication protocols to connect clients to the server. Each protocol can have a different data structure. The principle of application of the algorithm does not depend on the very structure of the system on which the corresponding protocol works. The algorithm is applied to all data that can be transmitted over the network mesh to which the clients are connected. Thanks to the individual approach, it is possible to achieve data reliability, as well as avoid the use of device resources thanks to an optimized algorithm and some software development tools

    Evaluación de técnicas de cifrado para el intercambio de datos en internet de las cosas en el ámbito de la salud

    Get PDF
    A nivel mundial, la cifra de cibernautas que al conectarse a Internet creció de 3.9 mil millones en el 2018 y crecerá en 2023 a 5.3 millones. Otro concepto valioso es que Internet de las cosas permitirá a las personas usar los servicios de conexión por medio de dispositivos IoT, en dónde la asistencia médica tendrá menor intensidad laboral y costo operacional logrando así la automatización de dispositivos médicos conectados y el manejo de teléfonos inteligentes, así como también el uso de software que aceptará realizar pruebas en pacientes de manera más rápida y precisa. La seguridad de estos datos es una tarea desafiante; sin embargo, se pueden mitigar con técnicas de cifrado de datos, siendo cruciales cuando se trata de la autenticación de usuarios y la privacidad de los datos. Quedando claro que, en el campo de ingeniería, se ha advertido que a lo largo de los años estás técnicas presentan problemas de deficiencia en el intercambio de datos, debido que con el auge de los dispositivos IoT y su gran interconexión genera un gran número de amenazas y ataques. Por lo que en esta investigación se realizó un proceso de verificación de artículos probados en el banco de datos IEE Xplore y ProQuest, para la elección de técnicas de cifrado, después se identificó los criterios de valoración de dichas técnicas de cifrado de datos en el cual se toman factores de evaluación que son de mucha importancia e influyentes en la ejecución de los algoritmos de cifrado, posteriormente se diseñó un escenario de pruebas para evaluar las técnicas de cifrado de datos seleccionado, diseñando un escenario de COVID-19 debido que con la pandemia se ha visto la dificultad de cómo proteger los datos de los trabajadores, después se aplicó las técnicas de cifrado simétrica (AES), asimétrica (SHA y RSA), por bloques(AES) e híbrida (SHA) y por último se estimó los resultados alcanzados. Obteniendo como resultado que, en el campo de la salud, la técnica más eficiente para el intercambio de datos es el cifrado Híbrido (algoritmo SHA 256), ya que, al intercambiar los datos, es el cifrado más eficiente en cuanto a tiempo de procesamiento total con un resultado de 0.00450016 segundos y rendimiento 0.276%, es decir que entre el tiempo de cifrado y descifrado es la que realizó la tarea más velozmente.TesisInfraestructura, Tecnología y Medio Ambient

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks

    LIPIcs, Volume 261, ICALP 2023, Complete Volume

    Get PDF
    LIPIcs, Volume 261, ICALP 2023, Complete Volum

    Undergraduate and Graduate Course Descriptions, 2023 Spring

    Get PDF
    Wright State University undergraduate and graduate course descriptions from Spring 2023

    2023-2024 Boise State University Undergraduate Catalog

    Get PDF
    This catalog is primarily for and directed at students. However, it serves many audiences, such as high school counselors, academic advisors, and the public. In this catalog you will find an overview of Boise State University and information on admission, registration, grades, tuition and fees, financial aid, housing, student services, and other important policies and procedures. However, most of this catalog is devoted to describing the various programs and courses offered at Boise State

    General Course Catalog [2022/23 academic year]

    Get PDF
    General Course Catalog, 2022/23 academic yearhttps://repository.stcloudstate.edu/undergencat/1134/thumbnail.jp
    corecore