Results 11 to 20 of about 1,362,310 (293)
Security Digital Evidence [PDF]
Non-repudiation of digital evidence is required by various use cases in today’s business cases for example in the area of medical products but also in public use cases like congestion charges. These use cases have in common that at a certain time an evidence record is generated to attest for the occurrence of a certain event.
Jennifer Richter +2 more
openaire +1 more source
Image encryption system based on a nonlinear joint transform correlator for the simultaneous authentication of two users [PDF]
We propose a new encryption system based on a nonlinear joint transform correlator (JTC) using the information of two biometrics (one digital fingerprint for each user) as security keys of the encryption system.
Millán Garcia-Varela, M. Sagrario +2 more
core +2 more sources
In industrial environments there are critical devices, so their correct operation must be ensured. In particular, having a secure record of the different events related to these devices is essential.
José Álvaro Fernández-Carrasco +4 more
doaj +1 more source
European Digital Libraries: Web Security Vulnerabilities [PDF]
Purpose – The purpose of this paper is to investigate the web vulnerability challenges at European library web sites and how these issues can affect the data protection of their patrons.
Kuzma, Joanne
core +2 more sources
Security of the Suffix Keyed Sponge
We formalize and analyze the general suffix keyed sponge construction, a pseudorandom function built on top of a cryptographic permutation. The construction hashes its data using the (keyless) sponge construction, transforms part of the state using the ...
Christoph Dobraunig, Bart Mennink
doaj +1 more source
Security and Independence of Process Safety and Control Systems in the Petroleum Industry
The developments of reduced manning on offshore facilities and increased information transfer from offshore to land continue and may also be a prerequisite for the future survival of the oil and gas industry.
Tor Onshus +8 more
doaj +1 more source
Practical Evaluation of Protected Residue Number System Scalar Multiplication
The Residue Number System (RNS) arithmetic is gaining grounds in public key cryptography, because it offers fast, efficient and secure implementations over large prime fields or rings of integers.
Louiza Papachristodoulou +3 more
doaj +1 more source
Experimental measurement-device-independent quantum digital signatures over a metropolitan network [PDF]
Quantum digital signatures (QDS) provide a means for signing electronic communications with informationtheoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable
Andersson, Erika +18 more
core +2 more sources
Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya +12 more
core +1 more source
Digital Age Security Threats: Challenges to IR Theories [PDF]
The significance of information and communication technology (ICT) has been widely felt not only within a state but also among and between the states in their multifarious day-to-day interactions.
Gaan, N. (Narottam)
core +1 more source

