Results 21 to 30 of about 165,246 (172)

Let Your CyberAlter Ego Share Information and Manage Spam [PDF]

open access: yes, 2005
Almost all of us have multiple cyberspace identities, and these {\em cyber}alter egos are networked together to form a vast cyberspace social network. This network is distinct from the world-wide-web (WWW), which is being queried and mined to the tune of
Boykin, P. Oscar   +4 more
core   +1 more source

CTFN: Multistage CNN-Transformer Fusion Network for ECG Authentication

open access: yesIET Biometrics
In the face of the mounting challenges posed by cybersecurity threats, there is an imperative for the development of robust identity authentication systems to safeguard sensitive user data.
Heng Jia   +7 more
doaj   +1 more source

Mapping cyberspace: visualising, analysing and exploring virtual worlds [PDF]

open access: yes, 1999
In the past years, with the development of computer networks such as the Internet and world wide web (WWW), cyberspace has been increasingly studied by researchers in various disciplines such as computer sciences, sociology, geography, and cartography
Jiang, B., Ormeling, F.
core  

Feature Graph Construction With Static Features for Malware Detection

open access: yesIET Information Security
Malware can greatly compromise the integrity and trustworthiness of information and is in a constant state of evolution. Existing feature fusion-based detection methods generally overlook the correlation between features.
Binghui Zou   +6 more
doaj   +1 more source

International Liability in Cyberspace [PDF]

open access: yes, 2001
Activities in cyberspace often expose companies to cybertorts , a species of tort particularly difficult to reconcile with standard insurance policies.
Crane, Matthew
core   +1 more source

Cyberspace As/And Space [PDF]

open access: yes, 2007
The appropriate role of place- and space-based metaphors for the Internet and its constituent nodes and networks is hotly contested. This essay seeks to provoke critical reflection on the implications of place- and space-based theories of cyberspace for ...
Cohen, Julie E.
core   +1 more source

Virtual reality: Theoretical basis, practical applications [PDF]

open access: yes, 1993
Virtual reality (VR) is a powerful multimedia visualization technique offering a range of mechanisms by which many new experiences can be made available.
Barker, Philip
core   +3 more sources

An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics

open access: yesIET Information Security
We propose a one-time blind signature scheme based on coding theory, which is improved on the basis of the SHMWW protocol. By adding two blinding factors, the anonymity of users is protected.
Haiyan Xiu   +3 more
doaj   +1 more source

Equality of Arms in the Digital Age [PDF]

open access: yes, 2008
Electronic commerce is important, and perhaps, inevitable. Thus to consider the legal implications of the growth and development of electronic commerce is essential.
Haloush, Haitham   +2 more
core  

A Provably Secure Authentication Protocol Based on PUF and ECC for IoT Cloud-Edge Environments

open access: yesIET Information Security
The Internet of Things (IoT) cloud model provides an efficient scheme for rapid collection, storage, processing, and analysis of massive node data, and its application has gradually expanded to key areas such as healthcare and transportation.
Xiong Wang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy