Results 11 to 20 of about 37,859 (190)

Cyber Security

open access: greenInternational Journal of Science and Research (IJSR)
Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks, damage, or unauthorized access. It involves a combination of technologies, processes, and human behavior to defend against threats like malware, phishing, and hacking, with the goal of ensuring the confidentiality, integrity, and availability of ...
Sanskriti Kumari, Ruhina Prasad
  +8 more sources

Cyber Security

open access: yesInternational Scientific Journal of Engineering and Management, 2023
Both cyber security and information security are frequently used interchangeably. The latter adds a new dimension to the former by considering human variables throughout the security process, making the individual the focus of attention and a potential target.
Priyatosh Jana   +5 more
  +8 more sources

Cyber Security

open access: yesINTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT, 2022
This book focus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace and provide novel solutions in various aspects. The first part of the book focus on digital society, addressing critical infrastructure and different forms of the digitalization, strategic focus on cyber security ...
Lehto Martti, Neittaanmäki Pekka
  +7 more sources

Generic attacks on small-state stream cipher constructions in the multi-user setting

open access: yesCybersecurity, 2023
Small-state stream ciphers (SSCs), which violate the principle that the state size should exceed the key size by a factor of two, still demonstrate robust security properties while maintaining a lightweight design.
Jianfu Huang   +5 more
doaj   +1 more source

A Secure Anonymous Identity-Based Virtual-Space Agreement Method for Crowds-Based Anonymous Communicate Scheme

open access: yesIET Information Security, 2023
Anonymous data exchange is in great demand in many situations, especially in remote control systems, in which a stable, secure, and secret data channel must be established between the controlling and controlled parties to distribute control commands and ...
Kai Lin   +3 more
doaj   +1 more source

Cyber-Attacks, Cryptocurrencies and Cyber Security

open access: yes, 2023
This paper provides comprehensive evidence on the effects of cyber-attacks (cyber-crime, cyber espionage, cyber warfare and hacktivism) and cyber security on the risk-adjusted returns, realised volatilities and trading volumes of the three main cryptocurrencies (Bitcoin, Ethereum and Litecoin).
Caporale GM   +3 more
openaire   +5 more sources

A Survey of COVID-19 Contact Tracing Apps

open access: yesIEEE Access, 2020
The recent outbreak of COVID-19 has taken the world by surprise, forcing lockdowns and straining public health care systems. COVID-19 is known to be a highly infectious virus, and infected individuals do not initially exhibit symptoms, while some remain ...
Nadeem Ahmed   +9 more
doaj   +1 more source

Verifiable image revision from chameleon hashes

open access: yesCybersecurity, 2021
In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure.
Junpeng Xu   +4 more
doaj   +1 more source

A Two-Dimensional Key Vector Based Fast and Lightweight Block Cipher for Constrained Devices [PDF]

open access: yesITM Web of Conferences
Gathering sensitive patient information is vital in healthcare for providing the proper therapy. The collected data must also be shared with the relevant parties in order to keep the environment open and honest.
Kakarla Shirisha   +2 more
doaj   +1 more source

A Publicly Verifiable E-Voting System Based on Biometrics

open access: yesCryptography, 2023
Voters use traditional paper ballots, a method limited by the factors of time and space, to ensure their voting rights are exercised; this method requires a lot of manpower and resources. Duplicate voting problems may also occur, meaning the transparency
Jinhui Liu   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy