Results 11 to 20 of about 1,362,310 (293)

Security Digital Evidence [PDF]

open access: yes2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010
Non-repudiation of digital evidence is required by various use cases in today’s business cases for example in the area of medical products but also in public use cases like congestion charges. These use cases have in common that at a certain time an evidence record is generated to attest for the occurrence of a certain event.
Jennifer Richter   +2 more
openaire   +1 more source

Image encryption system based on a nonlinear joint transform correlator for the simultaneous authentication of two users [PDF]

open access: yes, 2019
We propose a new encryption system based on a nonlinear joint transform correlator (JTC) using the information of two biometrics (one digital fingerprint for each user) as security keys of the encryption system.
Millán Garcia-Varela, M. Sagrario   +2 more
core   +2 more sources

ChronoEOS 2.0: Device Fingerprinting and EOSIO Blockchain Technology for On-Running Forensic Analysis in an IoT Environment

open access: yesSmart Cities, 2023
In industrial environments there are critical devices, so their correct operation must be ensured. In particular, having a secure record of the different events related to these devices is essential.
José Álvaro Fernández-Carrasco   +4 more
doaj   +1 more source

European Digital Libraries: Web Security Vulnerabilities [PDF]

open access: yes, 2010
Purpose – The purpose of this paper is to investigate the web vulnerability challenges at European library web sites and how these issues can affect the data protection of their patrons.
Kuzma, Joanne
core   +2 more sources

Security of the Suffix Keyed Sponge

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We formalize and analyze the general suffix keyed sponge construction, a pseudorandom function built on top of a cryptographic permutation. The construction hashes its data using the (keyless) sponge construction, transforms part of the state using the ...
Christoph Dobraunig, Bart Mennink
doaj   +1 more source

Security and Independence of Process Safety and Control Systems in the Petroleum Industry

open access: yesJournal of Cybersecurity and Privacy, 2022
The developments of reduced manning on offshore facilities and increased information transfer from offshore to land continue and may also be a prerequisite for the future survival of the oil and gas industry.
Tor Onshus   +8 more
doaj   +1 more source

Practical Evaluation of Protected Residue Number System Scalar Multiplication

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
The Residue Number System (RNS) arithmetic is gaining grounds in public key cryptography, because it offers fast, efficient and secure implementations over large prime fields or rings of integers.
Louiza Papachristodoulou   +3 more
doaj   +1 more source

Experimental measurement-device-independent quantum digital signatures over a metropolitan network [PDF]

open access: yes, 2017
Quantum digital signatures (QDS) provide a means for signing electronic communications with informationtheoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable
Andersson, Erika   +18 more
core   +2 more sources

Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]

open access: yes, 2015
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya   +12 more
core   +1 more source

Digital Age Security Threats: Challenges to IR Theories [PDF]

open access: yes, 2016
The significance of information and communication technology (ICT) has been widely felt not only within a state but also among and between the states in their multifarious day-to-day interactions.
Gaan, N. (Narottam)
core   +1 more source

Home - About - Disclaimer - Privacy