Desarrollo de software esteganográfico con criptográfia asociada
RESUMEN Proteger la información es un requisito fundamental para preservar su confidencialidad e integridad. El uso de criptografía y esteganografía, más que un simple compendio de técnicas y algoritmos, se ha convertido en una necesidad urgente en ...
Jorge Rivadeneira, Basel Halak
doaj
Beyond Bitcoin: Issues in Regulating Blockchain Transactions [PDF]
The buzz surrounding Bitcoin has reached a fever pitch. Yet in academic legal discussions, disproportionate emphasis is placed on bitcoins (that is, virtual currency), and little mention is made of blockchain technology—the true innovation behind the ...
Kiviat, Trevor I.
core +1 more source
Towards a Layered Architectural View for Security Analysis in SCADA Systems
Supervisory Control and Data Acquisition (SCADA) systems support and control the operation of many critical infrastructures that our society depend on, such as power grids. Since SCADA systems become a target for cyber attacks and the potential impact of
Ma, Zhendong +2 more
core
OntoSecAI: Ontology-driven security automation for AI-enabled systems. [PDF]
Ullah U, Haleem M, Ullah A.
europepmc +1 more source
A blockchain framework using proof of authority and smart contracts for ethical and secure healthcare asset management. [PDF]
Shaikh MF +4 more
europepmc +1 more source
Digital assets: risks, regulations, mitigation. [PDF]
Teng HW +30 more
europepmc +1 more source
A novel framework for secure cryptocurrency transactions using quantum crypto guard. [PDF]
Alsayaydeh JAJ +4 more
europepmc +1 more source
Beyond automation: How IT professionals utilize the invisible AI arm? [PDF]
Efremov L, Petrov I, Nikolovska I.
europepmc +1 more source
Cybersecurity as it relates to perfusion. [PDF]
Lung K.
europepmc +1 more source
A privacy preserving and auditable blockchain framework for seccure securites trading. [PDF]
Zhou E.
europepmc +1 more source

