Results 71 to 80 of about 22,394,325 (191)

Steganography Security: Principle and Practice [PDF]

open access: yesarXiv, 2018
This paper focuses on several theoretical issues and principles in steganography security, and defines four security levels by analyzing the corresponding algorithm instances. In the theoretical analysis, we discuss the differences between steganography security and watermarking security.
arxiv  

Securing Data Encryption

open access: yes, 2019
This article provide analysis about information security using cryptography techniques. After the analyzing different techniques of encryption, we are proposing Advance Encryption Standard (AES). The AES has the better security compared others encryption algorithm and prevent data from Spoofing. It is very efficient in both hardware and software.
openaire   +3 more sources

SecDOAR: A Software Reference Architecture for Security Data Orchestration, Analysis and Reporting [PDF]

open access: yesarXiv
A Software Reference Architecture (SRA) is a useful tool for standardising existing architectures in a specific domain and facilitating concrete architecture design, development and evaluation by instantiating SRA and using SRA as a benchmark for the development of new systems.
arxiv  

User-Centric IT Security - How to Design Usable Security Mechanisms [PDF]

open access: yesThe Fifth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services (CENTRIC 2012), pp. 7-12, November 2012, 2015
Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the average end user.
arxiv  

Secure Computation and Trustless Data Intermediaries in Data Spaces [PDF]

open access: yesarXiv
This paper explores the integration of advanced cryptographic techniques for secure computation in data spaces to enable secure and trusted data sharing, which is essential for the evolving data economy. In addition, the paper examines the role of data intermediaries, as outlined in the EU Data Governance Act, in data spaces and specifically introduces
arxiv  

Data security is crucial for Japanese science [PDF]

open access: bronze, 2002
Eitaka Tsuboi   +4 more
openalex   +1 more source

Database Security System supporting Access Control for Various Sizes of Data Groups [PDF]

open access: bronze, 2003
Min-A Jeong   +3 more
openalex   +1 more source

Home - About - Disclaimer - Privacy