Results 11 to 20 of about 1,275,223 (320)

Lyapunov exponent evaluation of a digital watermarking scheme proven to be secure [PDF]

open access: yesarXiv, 2012
In our previous researches, a new digital watermarking scheme based on chaotic iterations has been introduced. This scheme was both stego-secure and topologically secure. The stego-security is to face an attacker in the "watermark only attack" category, whereas the topological security concerns other categories of attacks.
Bahi, Jacques M.   +2 more
arxiv   +4 more sources

Digital Twins and Blockchain for IoT Management [PDF]

open access: yesThe 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI '23), July 10-14, 2023, Melbourne, VIC, Australia. 11 pages, 2023
Security and privacy are primary concerns in IoT management. Security breaches in IoT resources, such as smart sensors, can leak sensitive data and compromise the privacy of individuals. Effective IoT management requires a comprehensive approach to prioritize access security and data privacy protection.
arxiv   +1 more source

EFEKTIVITAS KERJASAMA UNITED KINGDOM DAN INDONESIA DALAM MENINGKATKAN DIGITAL SECURITY DI INDONESIA MELALUI UK-INDONESIA TECH HUB [PDF]

open access: yes, 2023
The digital ecosystem in Indonesia has been growing in recent years. The Covid-19 pandemic was the point where the number of online application users rose rapidly to 442%.
Feryzal, Mochammad
core  

Image encryption system based on a nonlinear joint transform correlator for the simultaneous authentication of two users [PDF]

open access: yes, 2019
We propose a new encryption system based on a nonlinear joint transform correlator (JTC) using the information of two biometrics (one digital fingerprint for each user) as security keys of the encryption system.
Millán Garcia-Varela, M. Sagrario   +2 more
core   +2 more sources

European Digital Libraries: Web Security Vulnerabilities [PDF]

open access: yes, 2010
Purpose – The purpose of this paper is to investigate the web vulnerability challenges at European library web sites and how these issues can affect the data protection of their patrons.
Kuzma, Joanne
core   +2 more sources

Security Attributes Based Digital Rights Management [PDF]

open access: yes, 2002
Most real-life systems delegate responsibilities to different authorities. We apply this model to a digital rights management system, to achieve flexible security.
C. N. Chong   +6 more
core   +6 more sources

Calibrating the Attack to Sensitivity in Differentially Private Mechanisms

open access: yesJournal of Cybersecurity and Privacy, 2022
This work studies the power of adversarial attacks against machine learning algorithms that use differentially private mechanisms as their weapon.
Ayşe Ünsal, Melek Önen
doaj   +1 more source

Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2018
Cryptographic hashing modes come in many flavors, including Merkle-Damgård with various types of strengthening, Merkle trees, and sponge functions. As underlying primitives, these functions use arbitrary functions, permutations, or block ciphers. In this
Joan Daemen   +2 more
doaj   +1 more source

Promising Areas of Cooperation on Digital Security and Media Policy Between Russia and Africa [PDF]

open access: yesУченые записки Института Африки Российской академии наук, 2022
rom the perspective of current political and military confrontation, many world nations are challenged to balance independence and development. It is the digital and informational defense that has raised a special attention when the world market of IT ...
ULANOVA Natalya Sergeevna
doaj   +1 more source

Securing the Digital World: Protecting smart infrastructures and digital industries with Artificial Intelligence (AI)-enabled malware and intrusion detection [PDF]

open access: yesJournal of Industrial Information Integration, Volume 36, 2023, 100520, 2023
The last decades have been characterized by unprecedented technological advances, many of them powered by modern technologies such as Artificial Intelligence (AI) and Machine Learning (ML). The world has become more digitally connected than ever, but we face major challenges.
arxiv   +1 more source

Home - About - Disclaimer - Privacy