Latest Publications & Patents on Information Security (InfoSec)

This is our latest selection of worldwide publications and patents in english on Information Security (InfoSec), between many scientific online journals, classified and focused on information security, infosec, ransomware, authentication, phishing, malware, firewall, encryption, intrusion detection, intrusion prevention, zero-day exploit, multi-factor authentication, public key, private key, access control, denial of service, social engineering, security awareness, encryption, CIA triad, antivirus and cipher.

Tip: further to this selection on Information Security (InfoSec), you can search and filter our:
    * free publications search tool * by author, topic, keywords, date or journal.
    * free patents search tool * for patents in english from the European Patent Office.

A Weak-PUF-Assisted Strong PUF with Inherent Security Using Metastability Implemented on FPGAs

Published on 2025-03-02 by Jiaji He, Guoqian Song, Qizhi Zhang, Xiaoxiang Wang, Yanjiang Liu, Yao Li, Mao Ye, Yiqiang Zhao @MDPI

Abstract: Physical unclonable functions (PUFs) are emerging as highly promising lightweight hardware security primitives that offer novel information security solutions. PUFs capitalize on the intrinsic physical variations within circuits to generate unpredictable responses. Nevertheless, diverse PUF types often encounter difficulties in concurrently fulfilling multiple performance requisites. As is well known, strong PUFs possess significantly larger challenge–response pair (CRP) set sizes.[...]


Our summary: Newly devised DL-PUF enhances CRP set size and security performance, Implemented on 45 nm Xilinx Spartan 6 XC6SLX25 FPGAs, Resilient against machine learning attacks.

Weak PUF, Strong PUF, Metastability, FPGAs

Publication

Privacy-Preserving Data Sharing and Computing for Outsourced Policy Iteration with Attempt Records from Multiple Users

Published on 2025-02-28 by Bangyan Chen, Jun Ye @MDPI

Abstract: Reinforcement learning is a machine learning framework that relies on a lot of trial-and-error processes to learn the best policy to maximize the cumulative reward through the interaction between the agent and the environment. In the actual use of this process, the computing resources possessed by a single user are limited so that the cooperation of multiple users are needed, but the joint learning of multiple users introduces the problem of privacy leakage. This research proposes a method to sa[...]


Our summary: Reinforcement learning framework relies on trial-and-error processes to maximize cumulative reward. Multiple users cooperation needed due to limited resources, but introduces privacy leakage issue. Proposed method securely shares effort in encrypted state, performs reinforcement learning with outsourcing service using cryptographic algorithms and multi-key ciphertext fusion mechanism. Provable security and acceptable performance impact shown in experimental results.

Privacy-Preserving, Data Sharing, Computing, Outsourced Policy Iteration

Publication

Development of Jaw Controlled Wireless Navigation Governing System for Wheelchair to Empower Person with Impaired Upper Limb

Published on 2025-02-28 by Dhanasekar Ravikumar, Vijayaraja Loganathan, Narenthira Sai Raam Pasumponthangaperumal, Mirthulaa Suresh Kumar, Pranav Ponnovian, Benita Evangeline Balan @MDPI

Abstract: The central focus of this work is to implement an effective and cost-friendly wheelchair motion control system for individuals with impaired upper body movements by utilizing the mandibular movement of an individual. The initial part of the system is the signal-gathering system that is built of two functional blocks, the magnet and sensing block. A magnet is affixed to the inferior region of the user’s mandible, and the sensing block, which incorporates two static HMCL 5883L sensor[...]


Our summary: Development of jaw-controlled wheelchair navigation system using HMCL 5883L sensor for individuals with impaired upper limb mobility. Magnet and sensing blocks detect mandibular movement to control wheelchair trajectory. Incorporates sophisticated yet budget-friendly technology for sustainable and available mobility solution.

Wireless Navigation, Wheelchair, HMCL 5883L sensor, Microcontroller

Publication

Root Cause Analysis for Observed Increased Sedimentation in a Commercial Residue Hydrocracker

Published on 2025-02-27 by Ivelina Shishkova, Dicho Stratiev, Petko Kirov, Rosen Dinkov, Sotir Sotirov, Evdokia Sotirova, Veselina Bureva, Krassimir Atanassov, Vesislava Toteva, Svetlin Vasilev, Dobromir Yordanov, Radoslava Nikolova, Anife Veli @MDPI

Abstract: Ebullated bed vacuum residue hydrocracking is a well-established technology providing a high conversion level of low-value residue fractions in high-value light fuels. The main challenge in this technology when processing vacuum residues derived from different crude oils is the sediment formation rate that leads to equipment fouling and cycle length shortening. With the severity enhancement, the asphaltenes become more aromatic and less soluble which leads to sediment formation when the differen[...]


Our summary: Evaluation of sediment formation in a commercial residue hydrocracker revealed the impact of feed properties and process conditions on the increased sediment content, leading to equipment fouling and cycle length shortening.

Root Cause Analysis, Sedimentation, Hydrocracker, Asphaltene

Publication

Privacy-Preserved Visual Simultaneous Localization and Mapping Based on a Dual-Component Approach

Published on 2025-02-27 by Mingxu Yang, Chuhua Huang, Xin Huang, Shengjin Hou @MDPI

Abstract: Edge-assisted visual simultaneous localization and mapping (SLAM) is widely used in autonomous driving, robot navigation, and augmented reality for environmental perception, map construction, and real-time positioning. However, it poses significant privacy risks, as input images may contain sensitive information, and generated 3D point clouds can reconstruct original scenes. To address these concerns, this paper proposes a dual-component privacy-preserving approach for visual SLAM. First, a priv[...]


Our summary: This paper presents a dual-component privacy-preserving approach for visual SLAM, combining object detection and image inpainting for privacy protection and an encryption algorithm for 3D point cloud data. The proposed method effectively safeguards privacy-sensitive information while maintaining accurate pose estimation in dynamic outdoor scenes and prevents unauthorized attacks on recovering the original point cloud.

Privacy-Preserved, Visual SLAM, Dual-Component Approach, Privacy Protection

Publication

Modular Neural Network Model for Biometric Authentication of Personnel in Critical Infrastructure Facilities Based on Facial Images

Published on 2025-02-27 by Oleksandr Korchenko, Ihor Tereikovskyi, Ruslana Ziubina, Liudmyla Tereikovska, Oleksandr Korystin, Oleh Tereikovskyi, Volodymyr Karpinskyi @MDPI

Abstract: The widespread implementation of neural network tools for biometric authentication based on facial and iris images at critical infrastructure facilities has significantly increased the level of security. However, modern requirements dictate the need to modernize these tools to increase resistance to spoofing attacks, as well as to provide a base for assessing the compliance of the psycho-emotional state of personnel with job responsibilities, which is difficult to ensure using traditional monoli[...]


Our summary: Development of a modular neural network model for biometric authentication of personnel in critical infrastructure facilities based on facial images, increasing security and resistance to spoofing attacks, and assessing psycho-emotional state of personnel.

Neural Network, Biometric Authentication, Modular Model, Facial Images

Publication

Method for performing verification by using shared key, method for performing verification by using public key and private key, and apparatus

Patent published on the 2025-02-19 in EP under Ref EP4510502 by HUAWEI TECH CO LTD [CN] (He Chengdong [cn], Li Hua [cn])

Abstract: A method for performing verification by using a shared key, a method for performing verification by using a public key and a private key, and an apparatus are disclosed. The method for performing verification by using a shared key includes: receiving, by a first network element, a registration request message from a second network element, where the registration request message includes a user identifier, first network identifier information, and second network identifier information, the second[...]


Our summary: Method for performing verification using shared key, public key, and private key. Verification method includes receiving registration request, verifying with shared key, and sending response message.

verification, shared key, public key, private key

Patent

Split packet router for time sensitive networking

Patent published on the 2025-02-19 in EP under Ref EP4510527 by INTEL CORP [US] (Kasichainula Kishore [us])

Abstract: A network interface device for implementing scheduling for time sensitive networking includes a network interface device comprising media access control (MAC) circuitry, including a priority router to parse a packet payload to determine a priority value; determine a corresponding traffic class based on the priority value from the packet payload; and route the packet payload to one of a plurality of traffic class-based packet buffers based on the traffic class; and a packet router to: retrieve a [...]


Our summary: Split packet router for time sensitive networking, network interface device with priority router and packet router, implements scheduling for time sensitive networking.

packet router, time sensitive networking, network interface device, scheduling

Patent

Table of Contents
    Add a header to begin generating the table of contents

    STATE ASSUMENDO?
    La meccanica combina software ed elettronica in prodotti di successo. Posso aiutare come Product Dev, R&D Manager o Project Manager?
    Sviluppo efficace del prodotto

    Disponibile con breve preavviso in Francia e in Svizzera.
    Contattatemi su LinkedIn
    Design-to-cost, ergonomia, volumi medio-alti, industrie regolamentate, CE e FDA, CAD, Solidworks, Lean Sigma Black Belt, ISO 13485 Medico Classe II e III

    it_ITIT
    Torna in alto