Results 41 to 50 of about 22,394,325 (191)

PUFchain: A Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE) [PDF]

open access: yesIEEE Consumer Electronics Magazine, 2019
This article presents the first-ever blockchain that can simultaneously handle device and data security, which is important for the emerging Internet-of-Everything (IoE).
S. Mohanty   +3 more
semanticscholar   +1 more source

Lightweight Data-Security Ontology for IoT †

open access: yesItalian National Conference on Sensors, 2020
Although current estimates depict steady growth in Internet of Things (IoT), many works portray an as yet immature technology in terms of security. Attacks using low performance devices, the application of new technologies and data analysis to infer ...
Pedro Gonzalez-Gil   +2 more
semanticscholar   +1 more source

Cryptography approach for Secure Outsourced Data Storage in Cloud Environment [PDF]

open access: yesarXiv, 2023
A large amount of data and applications are migrated by researchers, stakeholders, academia, and business organizations to the cloud environment due to its large variety of services, which involve the least maintenance cost, maximum flexibility, and on-demand service for storage, computation, and data distribution intentions.
arxiv  

Bayes Security: A Not So Average Metric [PDF]

open access: yes, 2020
Security system designers favor worst-case security metrics, such as those derived from differential privacy (DP), due to the strong guarantees they provide. On the downside, these guarantees result in a high penalty on the system's performance. In this paper, we study Bayes security, a security metric inspired by the cryptographic advantage. Similarly
arxiv   +1 more source

The Challenges with Internet of Things for Business [PDF]

open access: yes, 2020
Many companies consider IoT as a central element for increasing competitiveness. Despite the growing number of cyberattacks on IoT devices and the importance of IoT security, no study has yet primarily focused on the impact of IoT security measures on the security challenges.
arxiv   +1 more source

Data, Data Banks and Security [PDF]

open access: yesEuropean Journal for Security Research, 2020
AbstractThe article discusses different examples of data-driven policing, its legal provisions and effects on a society’s understanding of public security. It distinguishes between (a) the collection of classical data such as fingerprints or DNA, which serve to identify suspects and to collect evidence, (b) the processes and the impetus of big data ...
openaire   +2 more sources

Combination of Hiding and Encryption for Data Security

open access: yesInternational Journal of Interactive Mobile Technologies, 2020
One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messaging between two sides without detection. In this paper, an algorithm
Ibtisam A. Aljazaery   +2 more
semanticscholar   +1 more source

Secure Computation Framework for Multiple Data Providers Against Malicious Adversaries [PDF]

open access: yessubmission of CCS 2020, 2020
Due to the great development of secure multi-party computation, many practical secure computation schemes have been proposed. As an example, different secure auction mechanisms have been widely studied, which can protect bid privacy while satisfying various economic properties.
arxiv  

Enhancing Data Security with Secure FTP

open access: yes, 2022
Secure FTP (File Transfer Protocol) stands as a cornerstone in modern data exchange, providing a robust mechanism for secure file transfers over networks. This abstract delves into the fundamental principles and key features of Secure FTP, shedding light on its pivotal role in safeguarding data integrity and confidentiality. Secure FTP encompasses two
openaire   +1 more source

A Formal Analysis of 5G Authentication [PDF]

open access: yes, 2018
Mobile communication networks connect much of the world's population. The security of users' calls, SMSs, and mobile data depends on the guarantees provided by the Authenticated Key Exchange protocols used. For the next-generation network (5G), the 3GPP group has standardized the 5G AKA protocol for this purpose.
arxiv   +1 more source

Home - About - Disclaimer - Privacy