Results 11 to 20 of about 288,624 (313)
Verifiable image revision from chameleon hashes
In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure.
Junpeng Xu +4 more
doaj +1 more source
Cyber security fear appeals:unexpectedly complicated [PDF]
Cyber security researchers are starting to experiment with fear appeals, with a wide variety of designs and reported efficaciousness. This makes it hard to derive recommendations for designing and deploying these interventions. We thus reviewed the wider
Albayram Y. +39 more
core +2 more sources
Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge [PDF]
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture.
Ani, Uchenna +9 more
core +3 more sources
A Two-Dimensional Key Vector Based Fast and Lightweight Block Cipher for Constrained Devices [PDF]
Gathering sensitive patient information is vital in healthcare for providing the proper therapy. The collected data must also be shared with the relevant parties in order to keep the environment open and honest.
Kakarla Shirisha +2 more
doaj +1 more source
A Publicly Verifiable E-Voting System Based on Biometrics
Voters use traditional paper ballots, a method limited by the factors of time and space, to ensure their voting rights are exercised; this method requires a lot of manpower and resources. Duplicate voting problems may also occur, meaning the transparency
Jinhui Liu +5 more
doaj +1 more source
A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports
Advances in the Internet of Things (IoT) and aviation sector have resulted in the emergence of smart airports. Services and systems powered by the IoT enable smart airports to have enhanced robustness, efficiency and control, governed by real-time ...
Nickolaos Koroniotis +4 more
doaj +1 more source
AppChainer: investigating the chainability among payloads in android applications
Statistics show that more than 80 applications are installed on each android smartphone. Vulnerability research on Android applications is of critical importance.
Xiaobo Xiang +5 more
doaj +1 more source
Person Re-Identification Method Based on Dual Descriptor Feature Enhancement
Person re-identification is a technology used to identify individuals across different cameras. Existing methods involve extracting features from an input image and using a single feature for matching.
Ronghui Lin +5 more
doaj +1 more source
How does intellectual capital align with cyber security? [PDF]
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen +2 more
core +3 more sources
Anti-forensics techniques, particularly steganography and cryptography, have become increasingly pressing issues affecting current digital forensics practices. This paper advances the automation of hidden evidence extraction in audio files by proposing a
Mohamed Ghane +4 more
doaj +1 more source

