Results 1 to 10 of about 111,051 (87)

On Using Encryption Techniques to Enhance Sticky Policies Enforcement [PDF]

open access: yes, 2008
How to enforce privacy policies to protect sensitive personal data has become an urgent research topic for security researchers, as very little has been done in this field apart from some ad hoc research efforts.
Tang, Qiang
core   +14 more sources

PRECEPT:a framework for ethical digital forensics investigations [PDF]

open access: yes, 2020
Purpose: Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics has become far more sophisticated over the years and is now able ...
Ferguson, R.I.   +3 more
core   +5 more sources

The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs [PDF]

open access: yes, 2011
Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password problem. Building upon chaotic dynamics, criticality at phase transitions, CAPTCHA
  +12 more
core   +2 more sources

Roadmap on optical security [PDF]

open access: yes, 2016
Postprint (author's final ...
Javidi, Bahram   +2 more
core   +2 more sources

Cloud Computing in the Quantum Era [PDF]

open access: yes, 2019
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud.
Kaiiali, Mustafa   +2 more
core   +2 more sources

Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment

open access: yes, 2020
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users.
da Rocha, Marciano   +5 more
core   +1 more source

A Novel Latin Square Image Cipher

open access: yes, 2012
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson   +45 more
core   +1 more source

3D Textured Model Encryption via 3D Lu Chaotic Mapping

open access: yes, 2017
In the coming Virtual/Augmented Reality (VR/AR) era, 3D contents will be popularized just as images and videos today. The security and privacy of these 3D contents should be taken into consideration.
A Bogdanov   +9 more
core   +1 more source

How Smart is your Android Smartphone? [PDF]

open access: yes, 2010
Smart phones are ubiquitous today. These phones generally have access to sensitive personal information and, consequently, they are a prime target for attackers.
Mulani, Deepika
core   +3 more sources

Homomorphic Data Isolation for Hardware Trojan Protection

open access: yes, 2015
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy