Search
Now showing items 1-10 of 41
Cusum - Entropy: An efficient method for DDoS attack detection
(Ieee, 2016)
Computers and Internet have evolved into necessary tools for our professional, personal and social lives. As a result of growing dependence, the availability of these systems has become a concern. This concern increases ...
An overview of cryptographic accumulators
(Scitepress, 2021)
This paper contributes a primer on cryptographic accumulators and how to apply them practically. A cryptographic accumulator is a space- and time-efficient data structure used for set membership tests. Since it is possible ...
CAPEN: Cryptographic accumulator based privacy preserving exposure notification
(IEEE, 2021)
Contact tracing has a significant contribution in preventing the rapid spread of infectious diseases. During the COVID-19 pandemic, local authorities, researchers and the tech industry focused on developing digital contact ...
Lightweight offline authentication scheme for secure remote working environment
(IEEE, 2021)
During pandemic situations, remote work security and reliability become more important for sustainability. The main problem in remote working is providing a reliable internet connection between remote working employees and ...
Measuring instructional design competencies of future professionals: construct validity of the ibstpi(R) standards
(Springer, 2021)
Competencies that constitute the instructional design profession and how these competencies should be measured have been of interest to researchers for many years. Among the competency sets developed to date, the ibstpi(R) ...
ESAR: Enhanced secure authentication and revocation scheme for vehicular ad hoc networks
(Elsevier, 2022)
Vehicle Ad Hoc Network (VANET) systems that use Public Key Infrastructure (PKI) experience significant delays when checking Certificate Revocation Lists (CRLs) and performing key pair-based asymmetric cryptographic operations. ...
Comparative analysis of energy costs of asymmetric vs symmetric encryption-based security applications
(IEEE, 2022)
Public key algorithms are heavily used in many digital applications including key establishment schemes, secure messaging apps, and digital signature schemes in cryptocurrencies. Recent developments in the field of quantum ...
Distributed denial of service (DDoS): A history
(IEEE, 2022)
Distributed denial of service (DDoS) attacks remain a persistent nuisance on the Internet. They exploit the fact that the Internet lacks centralized access control. Since this vulnerability was a core design decision of ...
Correlation value determined to increase Salmonella prediction success of deep neural network for agricultural waters
(Springer, 2022)
The use of computer-based tools has been becoming popular in the field of produce safety. Various algorithms have been applied to predict the population and presence of indicator microorganisms and pathogens in agricultural ...
Fuzzy rule based classification system from vehicle-to-grid data
(IEEE, 2021)
Vehicle-to-Grid (V2G) system is becoming a very popular concept since it has various benefits such as reducing energy consumption, being environmental friendly, bi-directional charging, and load balancing. Although, it ...