-
141
Responsibility for administrative delicts within banking operations
Published 2018-11-01“…The author names specific features that are inherent for administrative responsibility within banking operations, namely: small public harm is based on normative, factual and procedural grounds, has negative consequences for delinquency, is accompanied by public condemnation of delicts, does not involve cryptography. It has been concluded that administrative responsibility for delicts within banking operations is the application of enforcement action for a delinquent offender (an individual or a legal entity) for the violation of banking legislation by the National Bank of Ukraine that are stipulated by the relevant administrative and legal norm. …”
Get full text
Article -
142
Legal Certainty Regarding the Conversion of Land Certificates To An Electronic System Based On Security Principles
Published 2024-11-01“…The benefits for the community from electronic certificates are that there is guaranteed legal certainty and it reduces land certificate disputes because the electronic certificate security system already uses encryption technology such as cryptography. KEYWORDS: Security Guarantee, Electronic Land Certificate…”
Get full text
Article -
143
Reusable and robust fuzzy extractor for CRS-dependent sources
Published 2025-01-01“…Our construction is built upon some well-studied cryptography, including a collision resistant hash function, a symmetric key encryption that keeps secure with respect to auxiliary input, a public key encryption and simulation-sound non-interactive zero-knowledge argument. …”
Get full text
Article -
144
Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments
Published 2025-01-01“…To enable privacy-preserving authentication, access control, and secure communication, the framework integrates blockchain technology with Zero Trust Architecture (ZTA) and post-quantum cryptography. A hybrid Reinforcement-Lattice Blockchain KeyGen for quantum-resilient key generation, Deep Q-Network Multi-Factor Secure Key (DQN-MFSK) for dynamic selection of keys, and Zero-Knowledge Proof for privacy-preserving signatures are employed to achieve secure IoT settings. …”
Get full text
Article -
145
RAM-MEN: Robust authentication mechanism for IoT-enabled edge networks
Published 2025-01-01“…This paper introduces a novel lightweight AM, called RAM-MEN that employs cryptography and physically unclonable functions (PUFs) to secure IoT-enabled MEC environments in the 6G era. …”
Get full text
Article -
146
The impact of digital technologies on the information potential of accounting (financial) statements. Part 2: Impact of digital platforms and models on transparency of corporate re...
Published 2022-09-01“…The use in the course of the study of general scientific methods of analysis and synthesis, as well as methods of logical comparison, reduction and selection of methodologically important facts of reality, made it possible to conclude that in legal terms, the electronic form of existence of objects, objects, processes is legitimized, and the digital form is a deep care into the virtual world through cryptography, the use of complex systems, encryption code and a limited number of participants. …”
Get full text
Article -
147
A Novel Scheme for Construction of S-Box Using Action of Power Associative Loop and Its Applications in Text Encryption
Published 2024-01-01“…Substitution boxes (S-boxes) play an important role in symmetric key cryptography because they add complexity and resist cryptanalysis, improving the overall security of encrypted data. …”
Get full text
Article -
148
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
Published 2020-04-01“…Due to less proxy signature schemes in the post-quantum cryptography aspect, in this article, we investigate the proxy signature in the post-quantum setting so that it can resist against the potential attacks from the quantum adversaries. …”
Get full text
Article -
149
Quantum algorithms for enhanced educational technologies
Published 2025-01-01“…Modern quantum algorithms like Grover’s Algorithm and Quantum Annealing support various functionalities like rapidity in processing as well as instantaneous flexibility towards customization of learning resources for the students and proper optimization of the learning trail. Also, quantum cryptography provides reliable security and prevention against future attacks on cyber security hence providing safe means of transferring educational data. …”
Get full text
Article -
150
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
Published 2025-01-01“…Studies are also ongoing on post-quantum cryptography, although they require significant computational resources and are challenging to implement in Internet of Things (IoT) devices. …”
Get full text
Article -
151
Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors
Published 2010-10-01“…In order to avoid dependencies on a compromised level of security, a WSN node with a microcontroller and a Field Programmable Gate Array (FPGA) is used along this work to implement a state-of-the art solution based on ECC (Elliptic Curve Cryptography). In this paper it is described how the reconfiguration possibilities of the system can be used to adapt ECC parameters in order to increase or reduce the security level depending on the application scenario or the energy budget. …”
Get full text
Article -
152
Legal Aspects of Telepathology
Published 2000-01-01“…Generally speaking, the principles of minimum data exchange, anonymity, pseudonymity and cryptography must be established as a basis for all telepathology procedures. …”
Get full text
Article -
153
Quantum secure patient login credential system using blockchain for electronic health record sharing framework
Published 2025-02-01“…The proposed scheme has been included for block encryption with the symmetric and asymmetric cryptography algorithms with respect to the hospital server and patients. …”
Get full text
Article -
154
Dual-Mode Encryption for UC-Secure String OT from Learning with Errors
Published 2024-01-01Get full text
Article -
155
Testing the Strength of Chaotic Systems as Seeds in a Pseudo Random Bit Generator
Published 2025-01-01“…Chaotic random bit generators have become an integral part of chaotic cryptography and other data protection applications, where they are used as sources of deterministic randomness, to secure an information signal. …”
Get full text
Article -
156
A Pipelined Hardware Design of FNTT and INTT of CRYSTALS-Kyber PQC Algorithm
Published 2024-12-01“…Lattice-based post-quantum cryptography (PQC) algorithms demand number theoretic transform (NTT)-based polynomial multiplications. …”
Get full text
Article -
157
Integrating sustainability into cybersecurity: insights from machine learning based topic modeling
Published 2025-01-01“…Moreover, ensuring cybersecurity in these interconnected networks demands the use of technologies such as resource-intensive cryptography and advanced intrusion detection systems. …”
Get full text
Article -
158
SYNTHESIS METHODS OF ALGEBRAIC NORMAL FORM OF MANY-VALUED LOGIC FUNCTIONS
Published 2016-03-01“…The rapid development of methods of error-correcting coding, cryptography, and signal synthesis theory based on the principles of many-valued logic determines the need for a more detailed study of the forms of representation of functions of many-valued logic. …”
Get full text
Article -
159
A SYNTHESIS METHOD OF BASIC TERNARY BENT-SQUARES BASED ON THE TRIAD SHIFT OPERATOR
Published 2017-05-01“…Practical application of advanced algebraic constructions in modern communication systems based on MC-CDMA (Multi Code Code Division Multiple Access) technology and in cryptography necessitates their further research. One of the most commonly used advanced algebraic construction is the binary bent-function having a uniform amplitude spectrum of the Walsh-Hadamard transform and, accordingly, having the maximal distance from the codewords of affine code. …”
Get full text
Article -
160
A Cryptographic Scheme for Construction of Substitution Boxes Using Quantic Fractional Transformation
Published 2022-01-01“…In the new era of cryptography, Substitution Boxes (S-Boxes) are very important to raise confusion in cipher text and the security of encryption directly depends on the algebraic strength of S-box. …”
Get full text
Article