Results 11 to 20 of about 70,409 (156)
Rancang Bangun Aplikasi Keamanan Data Menggunakan Metode AES Pada Smartphone [PDF]
Cryptography is one technique used to improve the security aspects of information. Cryptography is the study of science and art to maintain a message or data information so that the data is safe.
Amir Mahmud Hasibuan
semanticscholar +4 more sources
On Using Encryption Techniques to Enhance Sticky Policies Enforcement [PDF]
How to enforce privacy policies to protect sensitive personal data has become an urgent research topic for security researchers, as very little has been done in this field apart from some ad hoc research efforts.
Tang, Qiang
core +21 more sources
PRECEPT:a framework for ethical digital forensics investigations [PDF]
Purpose: Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics has become far more sophisticated over the years and is now able ...
Ferguson, R.I.+3 more
core +8 more sources
Over-the-air software updates in the internet of things : an overview of key principles [PDF]
Due to the fast pace at which IoT is evolving, there is an increasing need to support over-theair software updates for security updates, bug fixes, and software extensions. To this end, multiple over-the-air techniques have been proposed, each covering a
Bauwens, Jan+4 more
core +1 more source
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation [PDF]
With the wide deployment of public cloud computing infrastructures, using clouds to host data query services has become an appealing solution for the advantages on scalability and cost-saving.
Chen, Keke, Guo, Shumin, Xu, Huiqi
core +1 more source
Modeling Adversaries in a Logic for Security Protocol Analysis [PDF]
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which considers only adversaries that can compose and replay messages, and ...
Halpern, Joseph Y., Pucella, Riccardo
core +1 more source
Mobile Application Security Platforms Survey [PDF]
Nowadays Smartphone and other mobile devices have become incredibly important in every aspect of our life. Because they have practically offered same capabilities as desktop workstations as well as come to be powerful in terms of CPU (Central processing ...
Amen, Bakhtiar+2 more
core +1 more source
Roadmap on optical security [PDF]
Postprint (author's final ...
Javidi, Bahram+2 more
core +2 more sources
Formal Verification of Security Protocol Implementations: A Survey [PDF]
Automated formal verification of security protocols has been mostly focused on analyzing high-level abstract models which, however, are significantly different from real protocol implementations written in programming languages.
A Bauer+27 more
core +2 more sources
Spectrum sharing security and attacks in CRNs: a review [PDF]
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics.
Alhakami, Wajdi+2 more
core +2 more sources