Results 51 to 60 of about 240,934 (135)

Desarrollo de software esteganográfico con criptográfia asociada

open access: yesMaskana, 2017
RESUMEN Proteger la información es un requisito fundamental para preservar su confidencialidad e integridad. El uso de criptografía y esteganografía, más que un simple compendio de técnicas y algoritmos, se ha convertido en una necesidad urgente en ...
Jorge Rivadeneira, Basel Halak
doaj  

Beyond Bitcoin: Issues in Regulating Blockchain Transactions [PDF]

open access: yes, 2015
The buzz surrounding Bitcoin has reached a fever pitch. Yet in academic legal discussions, disproportionate emphasis is placed on bitcoins (that is, virtual currency), and little mention is made of blockchain technology—the true innovation behind the ...
Kiviat, Trevor I.
core   +1 more source

Towards a Layered Architectural View for Security Analysis in SCADA Systems

open access: yes, 2012
Supervisory Control and Data Acquisition (SCADA) systems support and control the operation of many critical infrastructures that our society depend on, such as power grids. Since SCADA systems become a target for cyber attacks and the potential impact of
Ma, Zhendong   +2 more
core  

Digital assets: risks, regulations, mitigation. [PDF]

open access: yesFinanc Innov
Teng HW   +30 more
europepmc   +1 more source

A novel framework for secure cryptocurrency transactions using quantum crypto guard. [PDF]

open access: yesPeerJ Comput Sci
Alsayaydeh JAJ   +4 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy