Results 21 to 30 of about 7,182 (203)
Meta‐Virtuality: Strategies of Disembeddedness in Virtual Interiorities
ABSTRACT To reclaim their seat in the rapidly growing market of virtual space, designers of the built environment can benefit from reevaluating theories that see the virtual as a mere extension/reflection of the physical. By claiming ontological autonomy from external worlds, the virtual is liberated from the hegemonic control of the physical.
Vahid Vahdat
wiley +1 more source
This research addresses the implementation of encryption and digital signature technique for electronic health record to prevent cybercrime such as robbery, modification and unauthorised access.
Mohamad Ali Sadikin, Rini Wisnu Wardhani
doaj +1 more source
A Security Enhancement to The Secure Mutual Authentication Protocol for Fog/Edge
A secured mutual authentication protocol (SMAP Fog/Edge) has been developed for fog computing. The protocol provides secure mutual authentication which lightweight and efficient for fog computing environments.
Yeni Farida +5 more
doaj +1 more source
Collaborative Intrusion Detection System with Snort Machine Learning Plugin
The increasing prevalence of cybercrime and cyber-attacks underscores the imperative need for organizations to implement robust network security measures. Nevertheless, current Intrusion Detection Systems (IDS) often rely on single-sensor or multi-sensor
Dimas Febriyan Priambodo +5 more
doaj +1 more source
NORX is an authenticated encryption scheme with associated data being publicly scrutinized as part of the ongoing CAESAR competition, where 14 other primitives are also competing.
Colin Chaigneau +4 more
doaj +1 more source
ESP32 and MAX30100 with Chebyshev Filter for Enhanced Heart and Oxygen Measurement
Health monitoring is important in the technology and information era. A health monitoring device must possess high accuracy in monitoring an individual's health.
Magfirawaty Magfirawaty +4 more
doaj +1 more source
The money array; or, show me the debtor
Money is neither a thing nor a concept. Rather, as many writers have rightly suggested, money is a relation. But what kind of relation? This articles refuses the now seemingly common-sense notion that money is an ‘institution’ or a ‘public good’. Instead,
Samuel A. Chambers
doaj +1 more source
Comparative Quality of Service Analysis of VPN Protocols on IPv6
The increase in internet users has led to the depletion of IPv4 supplies and the increase in cyber attacks, one of which is data leakage incidents. Several innovations were created such as switching to IPv6 which provides more addresses and implementing
Sabela Trisiana Oktavia +3 more
doaj +1 more source
Reducing a Masked Implementation’s Effective Security Order with Setup Manipulations
Couplings are a type of physical default that can violate the independence assumption needed for the secure implementation of the masking countermeasure. Two recent works by De Cnudde et al.
Itamar Levi +2 more
doaj +1 more source
Recently, our Finance Minister Mrs. Nirmala Sitharaman announced that there will be a tax of 30% on income from crypto currencies. For the taxation purpose, crypto currencies have now been included in the definition of Virtual Digital Asset. By choosing this topic we will analysis how this currency will impact economy of India and world if it is ...
null Simranpreet Kaur, null Priyanka
openaire +1 more source

