Results 21 to 30 of about 7,182 (203)

Meta‐Virtuality: Strategies of Disembeddedness in Virtual Interiorities

open access: yesJournal of Interior Design, EarlyView., 2022
ABSTRACT To reclaim their seat in the rapidly growing market of virtual space, designers of the built environment can benefit from reevaluating theories that see the virtual as a mere extension/reflection of the physical. By claiming ontological autonomy from external worlds, the virtual is liberated from the hegemonic control of the physical.
Vahid Vahdat
wiley   +1 more source

Implementation of RSA 2048-bit and AES 256-bit with Digital Signature for Secure Electronic Health Record Application

open access: yesCommIT Journal, 2016
This research addresses the implementation of encryption and digital signature technique for electronic health record to prevent cybercrime such as robbery, modification and unauthorised access.
Mohamad Ali Sadikin, Rini Wisnu Wardhani
doaj   +1 more source

A Security Enhancement to The Secure Mutual Authentication Protocol for Fog/Edge

open access: yesJurnal Nasional Pendidikan Teknik Informatika (JANAPATI)
A secured mutual authentication protocol (SMAP Fog/Edge) has been developed for fog computing. The protocol provides secure mutual authentication which lightweight and efficient for fog computing environments.
Yeni Farida   +5 more
doaj   +1 more source

Collaborative Intrusion Detection System with Snort Machine Learning Plugin

open access: yesJOIV: International Journal on Informatics Visualization
The increasing prevalence of cybercrime and cyber-attacks underscores the imperative need for organizations to implement robust network security measures. Nevertheless, current Intrusion Detection Systems (IDS) often rely on single-sensor or multi-sensor
Dimas Febriyan Priambodo   +5 more
doaj   +1 more source

Cryptanalysis of NORX v2.0

open access: yesIACR Transactions on Symmetric Cryptology, 2017
NORX is an authenticated encryption scheme with associated data being publicly scrutinized as part of the ongoing CAESAR competition, where 14 other primitives are also competing.
Colin Chaigneau   +4 more
doaj   +1 more source

ESP32 and MAX30100 with Chebyshev Filter for Enhanced Heart and Oxygen Measurement

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
Health monitoring is important in the technology and information era. A health monitoring device must possess high accuracy in monitoring an individual's health.
Magfirawaty Magfirawaty   +4 more
doaj   +1 more source

The money array; or, show me the debtor

open access: yesFinance and Society, 2023
Money is neither a thing nor a concept. Rather, as many writers have rightly suggested, money is a relation. But what kind of relation? This articles refuses the now seemingly common-sense notion that money is an ‘institution’ or a ‘public good’. Instead,
Samuel A. Chambers
doaj   +1 more source

Comparative Quality of Service Analysis of VPN Protocols on IPv6

open access: yesJurnal Nasional Pendidikan Teknik Informatika (JANAPATI)
The increase in internet users has led to the depletion of IPv4 supplies and the increase in cyber attacks, one of which is data leakage incidents. Several innovations were created such as switching to IPv6 which provides more addresses and implementing
Sabela Trisiana Oktavia   +3 more
doaj   +1 more source

Reducing a Masked Implementation’s Effective Security Order with Setup Manipulations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Couplings are a type of physical default that can violate the independence assumption needed for the secure implementation of the masking countermeasure. Two recent works by De Cnudde et al.
Itamar Levi   +2 more
doaj   +1 more source

Crypto Currency

open access: yesInternational Journal of Advanced Research in Science, Communication and Technology, 2022
Recently, our Finance Minister Mrs. Nirmala Sitharaman announced that there will be a tax of 30% on income from crypto currencies. For the taxation purpose, crypto currencies have now been included in the definition of Virtual Digital Asset. By choosing this topic we will analysis how this currency will impact economy of India and world if it is ...
null Simranpreet Kaur, null Priyanka
openaire   +1 more source

Home - About - Disclaimer - Privacy