Results 11 to 20 of about 66,192 (90)

PRECEPT:a framework for ethical digital forensics investigations [PDF]

open access: yes, 2020
Purpose: Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics has become far more sophisticated over the years and is now able ...
Ferguson, R.I.   +3 more
core   +5 more sources

Over-the-air software updates in the internet of things : an overview of key principles [PDF]

open access: yes, 2020
Due to the fast pace at which IoT is evolving, there is an increasing need to support over-theair software updates for security updates, bug fixes, and software extensions. To this end, multiple over-the-air techniques have been proposed, each covering a
Bauwens, Jan   +4 more
core   +1 more source

Rancang Bangun Aplikasi Keamanan Data Menggunakan Metode AES pada Smartphone [PDF]

open access: yes, 2017
Cryptography is one technique used to improve the security aspects of information. Cryptography is the study of science and art to maintain a message or data information so that the data is safe.
Hasibuan, A. M. (Amir)
core   +2 more sources

Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation [PDF]

open access: yes, 2013
With the wide deployment of public cloud computing infrastructures, using clouds to host data query services has become an appealing solution for the advantages on scalability and cost-saving.
Chen, Keke, Guo, Shumin, Xu, Huiqi
core   +1 more source

Roadmap on optical security [PDF]

open access: yes, 2016
Postprint (author's final ...
Javidi, Bahram   +2 more
core   +2 more sources

Spectrum sharing security and attacks in CRNs: a review [PDF]

open access: yes, 2014
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics.
Alhakami, Wajdi   +2 more
core   +3 more sources

Formal Verification of Security Protocol Implementations: A Survey [PDF]

open access: yes, 2014
Automated formal verification of security protocols has been mostly focused on analyzing high-level abstract models which, however, are significantly different from real protocol implementations written in programming languages.
A Bauer   +27 more
core   +3 more sources

A novel steganography approach for audio files [PDF]

open access: yes, 2020
We present a novel robust and secure steganography technique to hide images into audio files aiming at increasing the carrier medium capacity. The audio files are in the standard WAV format, which is based on the LSB algorithm while images are ...
Abdulrazzaq, Sazeen T   +2 more
core   +1 more source

Modeling Adversaries in a Logic for Security Protocol Analysis [PDF]

open access: yes, 2012
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which considers only adversaries that can compose and replay messages, and ...
Halpern, Joseph Y., Pucella, Riccardo
core   +1 more source

Home - About - Disclaimer - Privacy