Results 1 to 10 of about 815,217 (293)
Computer Security: Competing Concepts [PDF]
This paper focuses on a tension we discovered in the philosophical part of our multidisciplinary project on values in web-browser security. Our project draws on the methods and perspectives of empirical social science, computer science, and philosophy to identify values embodied in existing web-browser security and also to prescribe changes to existing
Helen Nissenbaum+2 more
arxiv +3 more sources
Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure [PDF]
Privacy and mutual authentication under corruption with temporary state disclosure are two significant requirements for real-life applications of RFID schemes. This paper proposes two practical RFID schemes that meet these requirements.
Ferucio Laurentiu Tiplea+2 more
doaj +1 more source
Verifiable image revision from chameleon hashes
In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure.
Junpeng Xu+4 more
doaj +1 more source
YOLOAL: Focusing on the Object Location for Detection on Drone Imagery
Object detection in drone-captured scenarios, which can be considered as a task of detecting dense small objects, is still a challenge. Drones navigate at different altitudes, causing significant changes in the size of the detected objects and posing a ...
Xinting Chen+4 more
doaj +1 more source
COMPUTER NETWORK SECURITY [PDF]
Computers that we connect to a network serve to exchange data, which is located in the computer’s working memory. Data transmission can also be done through electronic signals, and these connections can be wireless networks or wired networks.
Marijan MIJATOVIĆ, Marko MIJATOVIĆ
doaj
Analysis of Computer Network Information Security and Protection Strategy [PDF]
Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer ...
Ming Xiaobo, Chen Ying, Guo Jinhua
doaj +1 more source
Two-Stream Xception Structure Based on Feature Fusion for DeepFake Detection
DeepFake may have a crucial impact on people’s lives and reduce the trust in digital media, so DeepFake detection methods have developed rapidly. Most existing detection methods rely on single-space features (mostly RGB features), and there is still ...
Bin Wang+3 more
doaj +1 more source
One of the most promising enablers for the secure distributed operation of the Internet of Things (IoT) systems could be based on a mathematical construct widely known as blockchain that aims to neglect the system’s centralization and scalability ...
Inna Romashkova+2 more
doaj +1 more source
Metis: An Integrated Morphing Engine CPU to Protect Against Side Channel Attacks
Power consumption and electromagnetic emissions analyses are well established attack avenues for secret values extraction in a large range of embedded devices.
Francesco Antognazza+2 more
doaj +1 more source
Information Security Governance Framework in Public Cloud a Case in Low Resource Economies in Uganda
The study aimed at exploring the critical enablers to the development and usage of information security governance frameworks for cloud computing in Uganda.
Fredrick Kanobe+2 more
doaj +1 more source