Author:Tsague, HD; Nelwamondo, Fulufhelo V; Msimang, NDate:Nov 2012One of the most commonly used two-factor user authentication mechanisms nowadays is based on smart card and personal identity number or password. A scheme of this type is usually known as, a smart card based password authentication. The core ...Read more
Author:Mpalane, K; Tsague, HD; Gasela, N; Esiefa, EMDate:Dec 2015Small embedded devices such as microcontrollers have been widely used for identification, authentication, securing and storing confidential information. In all these applications, the security and privacy of the microcontrollers are of crucial ...Read more
Author:Mosola, NN; Dlamini, Thandokuhle M; Blackledge, JM; Eloff, JHP; Venter, HSDate:Sep 2017Cloud computing brings flexible and cost effective services. However, security concerns plague the cloud. Data confidentiality is one of the concerns inhibiting the adoption of cloud computing. This concern stems from various cyberattacks ...Read more
Author:Nwanebu, DocasDate:Mar 2019Securing information is a paramount feature in the world of internet where there is consistence enormous flow of information. With everyone having access to the same internet, sensitive information needs concealment from adversaries. Especially ...Read more
Author:Tsague, HD; Twala, BDate:Oct 2015Although cryptography constitutes a considerable part of the overall security architecture for several use cases in embedded systems, cryptographic devices are still vulnerable to the diversity types of side channel attacks. Improvement in ...Read more