Browsing by Subject "Cryptography"
Now showing items 1-6 of 6
-
Coercion-Resistant Verifiable Web-based Elections in Linear Time
(2019-08-21)Voter coercion broadly includes any attempt to influence the secrecy of a voter’s ballot, including bribery, vote stealing, and forced abstention. This risk, which affects the fundamentals of privacy in a democracy, is ... -
Efficient Hardware Implementations For The Advanced Encryption Standard Algorithm
(2010-10-26)This thesis introduces new efficient hardware implementations for the Advanced Encryption Standard (AES) algorithm. Two main contributions are presented in this thesis, the first one is a high speed 128 bits AES encryptor, ... -
Performance Analysis of Cryptographic Functions on Programmable NICs
(2022-08-12)The development of programmable network interface cards (also known as SmartNICs) often come with multiple computing cores and multi-hundred Gbps bandwidth that can be used as an enhancement of network computing to extend ... -
SEA: A Framework to ensure Security, Efficiency, Availability of Dynamic Wireless Sensor Network
(2020-04-15)Growing demand for the wireless sensor network has made it a hot research area and a new technology trend. Since sensor network technology can adapt to its environment, draw conclusions and learn from it, it makes more ... -
Security Framework for Combining Confidentiality and Integrity
(2015-05-08)Radio Frequency Identification (RFID) technology represents objects uniquely in order to track their movement in the real world. To avoid an unauthorized entity tracking the object and to offer security, RFID systems require ... -
SECURITY SOLUTIONS FOR SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) NETWORKS IN INDUSTRIAL CONTROL SYSTEMS
(2023-04-13)Supervisory Control and Data Acquisition (SCADA) networks play a vital role in Industrial Control Systems (ICSs). Industrial organizations perform operations remotely through SCADA systems to accelerate their processes. ...