Results 61 to 70 of about 2,666,306 (147)

A Secure Data Enclave and Analytics Platform for Social Scientists [PDF]

open access: yesarXiv, 2016
Data-driven research is increasingly ubiquitous and data itself is a defining asset for researchers, particularly in the computational social sciences and humanities. Entire careers and research communities are built around valuable, proprietary or sensitive datasets.
arxiv  

Still Wrong Use of Pairings in Cryptography [PDF]

open access: yes, 2016
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies ...
Kiraz, Mehmet Sabir, Uzunkol, Osmanbey
core   +1 more source

Group theory in cryptography [PDF]

open access: yes, 2010
This paper is a guide for the pure mathematician who would like to know more about cryptography based on group theory. The paper gives a brief overview of the subject, and provides pointers to good textbooks, key research papers and recent survey papers ...
Blackburn, Simon R.   +2 more
core  

Quantum/Relativistic Computation of Security and Efficiency of Electrical Power System for a Day-Ahead [PDF]

open access: yesarXiv, 2011
An algorithm for Electric Power System (EPS) quantum/relativistic security and efficiency computation for a day-ahead via perturbative renormalization of the EPS, finding the computation flowcharts, verification and validation is built in this paper.
arxiv  

Comments on "Routh Stability Criterion" [PDF]

open access: yesarXiv, 2010
In this note, we have shown special case on Routh stability criterion, which is not discussed, in previous literature. This idea can be useful in computer science applications.
arxiv  

Formal Security Analysis of Neural Networks using Symbolic Intervals [PDF]

open access: yesarXiv, 2018
Due to the increasing deployment of Deep Neural Networks (DNNs) in real-world security-critical domains including autonomous vehicles and collision avoidance systems, formally checking security properties of DNNs, especially under different attacker capabilities, is becoming crucial.
arxiv  

STORE: Security Threat Oriented Requirements Engineering Methodology [PDF]

open access: yesJournal of King Saud University - Computer and Information Sciences (2018), 2019
As we are continuously depending on information technology applications by adopting electronic channels and software applications for our business, online transaction and communication, software security is increasingly becoming a necessity and more advanced concern.
arxiv  

Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques

open access: yes, 2009
The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information.
Al-Khateeb, Wajdi F.   +6 more
core  

Predicting Tweet Posting Behavior on Citizen Security: A Hawkes Point Process Analysis [PDF]

open access: yesarXiv
The Perception of Security (PoS) refers to people's opinions about security or insecurity in a place or situation. While surveys have traditionally been the primary means to capture such perceptions, they need to be improved in their ability to offer real-time monitoring or predictive insights into future security perceptions.
arxiv  

A proposal for an incident regime that tracks and counters threats to national security posed by AI systems [PDF]

open access: yesarXiv
Recent progress in AI capabilities has heightened concerns that AI systems could pose a threat to national security, for example, by making it easier for malicious actors to perform cyberattacks on critical national infrastructure, or through loss of control of autonomous AI systems.
arxiv  

Home - About - Disclaimer - Privacy