Results 41 to 50 of about 22,394,325 (191)
PUFchain: A Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE) [PDF]
This article presents the first-ever blockchain that can simultaneously handle device and data security, which is important for the emerging Internet-of-Everything (IoE).
S. Mohanty+3 more
semanticscholar +1 more source
Lightweight Data-Security Ontology for IoT †
Although current estimates depict steady growth in Internet of Things (IoT), many works portray an as yet immature technology in terms of security. Attacks using low performance devices, the application of new technologies and data analysis to infer ...
Pedro Gonzalez-Gil+2 more
semanticscholar +1 more source
Cryptography approach for Secure Outsourced Data Storage in Cloud Environment [PDF]
A large amount of data and applications are migrated by researchers, stakeholders, academia, and business organizations to the cloud environment due to its large variety of services, which involve the least maintenance cost, maximum flexibility, and on-demand service for storage, computation, and data distribution intentions.
arxiv
Bayes Security: A Not So Average Metric [PDF]
Security system designers favor worst-case security metrics, such as those derived from differential privacy (DP), due to the strong guarantees they provide. On the downside, these guarantees result in a high penalty on the system's performance. In this paper, we study Bayes security, a security metric inspired by the cryptographic advantage. Similarly
arxiv +1 more source
The Challenges with Internet of Things for Business [PDF]
Many companies consider IoT as a central element for increasing competitiveness. Despite the growing number of cyberattacks on IoT devices and the importance of IoT security, no study has yet primarily focused on the impact of IoT security measures on the security challenges.
arxiv +1 more source
Data, Data Banks and Security [PDF]
AbstractThe article discusses different examples of data-driven policing, its legal provisions and effects on a society’s understanding of public security. It distinguishes between (a) the collection of classical data such as fingerprints or DNA, which serve to identify suspects and to collect evidence, (b) the processes and the impetus of big data ...
openaire +2 more sources
Combination of Hiding and Encryption for Data Security
One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messaging between two sides without detection. In this paper, an algorithm
Ibtisam A. Aljazaery+2 more
semanticscholar +1 more source
Secure Computation Framework for Multiple Data Providers Against Malicious Adversaries [PDF]
Due to the great development of secure multi-party computation, many practical secure computation schemes have been proposed. As an example, different secure auction mechanisms have been widely studied, which can protect bid privacy while satisfying various economic properties.
arxiv
Enhancing Data Security with Secure FTP
Secure FTP (File Transfer Protocol) stands as a cornerstone in modern data exchange, providing a robust mechanism for secure file transfers over networks. This abstract delves into the fundamental principles and key features of Secure FTP, shedding light on its pivotal role in safeguarding data integrity and confidentiality. Secure FTP encompasses two
openaire +1 more source
A Formal Analysis of 5G Authentication [PDF]
Mobile communication networks connect much of the world's population. The security of users' calls, SMSs, and mobile data depends on the guarantees provided by the Authenticated Key Exchange protocols used. For the next-generation network (5G), the 3GPP group has standardized the 5G AKA protocol for this purpose.
arxiv +1 more source