Results 1 to 10 of about 2,626,008 (101)
Post-Quantum Cryptography [PDF]
In this survey we propose to cover the prose of post-quantum cryptography over classical cryptography. We talk about the various cryptographic methods that are being practiced to safeguard our information.
Chaturvedi, Atul, Pranjal
core +1 more source
A Survey of Recent Developments in Testability, Safety and Security of RISC-V Processors
With the continued success of the open RISC-V architecture, practical deployment of RISC-V processors necessitates an in-depth consideration of their testability, safety and security aspects.
J. Anders+19 more
semanticscholar +1 more source
A Proof Theoretic Analysis of Intruder Theories [PDF]
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages Gamma under the theory of blind signatures and arbitrary convergent equational theories modulo ...
Alwen F Tiu, Rajeev Gore, Jeremy Dawson
doaj +1 more source
A Secured Data Processing Technique for Effective Utilization of Cloud Computing [PDF]
Digital humanities require IT Infrastructure and sophisticated analytical tools, including datavisualization, data mining, statistics, text mining and information retrieval.
Mbarek Marwan+2 more
doaj +1 more source
A novel approach based on segmentation for securing medical image processing over cloud [PDF]
Healthcare professionals require advanced image processing software to enhance the quality of clinical decisions. However, any investment in sophisticated local applications would dramatically increase healthcare costs.
Mbarek Marwan+2 more
doaj +1 more source
L-ECQV: Lightweight ECQV Implicit Certificates for Authentication in the Internet of Things
The vast expansion of the Internet of Things (IoT) devices and related applications has bridged the gap between the physical and digital world. Unfortunately, security remains a major challenge and the lack of secure links have fueled the increased ...
Manisha Malik+4 more
semanticscholar +1 more source
Security Reputation Metrics [PDF]
Security reputation metrics (aka. security metrics) quantify the security levels of organization (e.g., hosting or Internet access providers) relative to comparable entities. They enable benchmarking and are essential tools for decision and policy-making in security, and may be used to govern and steer responsible parties towards investing in security ...
arxiv +1 more source
Routing is a critical process in Wireless Sensor Networks (WSNs) since it is responsible for data transmission to base stations. Routing attacks are capable of completely destroying and degrading the function of WSNs.
I. M. E. And, S. Darwish
semanticscholar +1 more source
An Enhanced Technique to discover web data extraction and Data mining in Multi Cloud Server
Data mining is a critical stage in the Knowledge Discovery process acquire from databases (KDD), thus a new approach that’s can joint with online data process of extraction, which serves as data gathering from the global network ( web), and data mining ...
Dadi Madhu SivaRama Krishna, S.Suryanarayana Raju and Ajay Dilip Kumar Marapatl
semanticscholar +1 more source
High-dimensional measurement-device-independent quantum key distribution on two-dimensional subspaces [PDF]
Quantum key distribution (QKD) provides ultimate cryptographic security based on the laws of quantum mechanics. For point-to-point QKD protocols, the security of the generated key is compromised by detector side channel attacks.
Luca Dellantonio, A. Sørensen, D. Bacco
semanticscholar +1 more source