A current research trend in neurocomputing involves the design of novel artificial neural networks incorporating the concept of time into their operating model. In this paper, a novel architecture that employs stigmergy is proposed. Computational…
Abstract: The Industrial Internet of Things (IIoT) will lever- age on wireless network technologies to integrate in a seam- less manner Cyber-Physical systems into existing information systems. In this context, the 6TiSCH architecture, proposed by…
Random numbers are widely employed in cryptography and security applications, and they represent one of the main aspects to take care of along a security chain. They are employed for creation of encryption keys, and…
Modern networks have critical security needs and a suitable level of protection and performance is usually achieved with the use of dedicated hardware cryptographic cores. Although the Advanced Encryption Standard (AES) is considered the best…