Results 71 to 80 of about 22,394,325 (191)
Steganography Security: Principle and Practice [PDF]
This paper focuses on several theoretical issues and principles in steganography security, and defines four security levels by analyzing the corresponding algorithm instances. In the theoretical analysis, we discuss the differences between steganography security and watermarking security.
arxiv
This article provide analysis about information security using cryptography techniques. After the analyzing different techniques of encryption, we are proposing Advance Encryption Standard (AES). The AES has the better security compared others encryption algorithm and prevent data from Spoofing. It is very efficient in both hardware and software.
openaire +3 more sources
SecDOAR: A Software Reference Architecture for Security Data Orchestration, Analysis and Reporting [PDF]
A Software Reference Architecture (SRA) is a useful tool for standardising existing architectures in a specific domain and facilitating concrete architecture design, development and evaluation by instantiating SRA and using SRA as a benchmark for the development of new systems.
arxiv
User-Centric IT Security - How to Design Usable Security Mechanisms [PDF]
Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the average end user.
arxiv
Precision Health Data: Requirements, Challenges and Existing Techniques for Data Security and Privacy [PDF]
Chandra Thapa, S. Çamtepe
semanticscholar +1 more source
Data Security Management in Distributed Computer Systems [PDF]
Adi Armoni
openalex +1 more source
Secure Computation and Trustless Data Intermediaries in Data Spaces [PDF]
This paper explores the integration of advanced cryptographic techniques for secure computation in data spaces to enable secure and trusted data sharing, which is essential for the evolving data economy. In addition, the paper examines the role of data intermediaries, as outlined in the EU Data Governance Act, in data spaces and specifically introduces
arxiv
Data security is crucial for Japanese science [PDF]
Eitaka Tsuboi+4 more
openalex +1 more source
Database Security System supporting Access Control for Various Sizes of Data Groups [PDF]
Min-A Jeong+3 more
openalex +1 more source
Multi-camera spatio-temporal fusion and biased sequence-data learning for security surveillance [PDF]
Gang Wu+4 more
openalex +1 more source