Results 21 to 30 of about 1,362,310 (293)
Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers
Cryptographic hashing modes come in many flavors, including Merkle-Damgård with various types of strengthening, Merkle trees, and sponge functions. As underlying primitives, these functions use arbitrary functions, permutations, or block ciphers. In this
Joan Daemen +2 more
doaj +1 more source
Security Attributes Based Digital Rights Management [PDF]
Most real-life systems delegate responsibilities to different authorities. We apply this model to a digital rights management system, to achieve flexible security.
C. N. Chong +6 more
core +6 more sources
We present column parity mixers (CPM), a generalization of the Θ mixing layer that is used in Keccak. Thanks to our description using matrix arithmetic, we can easily derive algebraic, diffusion, and mask propagation properties, leading to a surprising ...
Ko Stoffelen, Joan Daemen
doaj +1 more source
Calibrating the Attack to Sensitivity in Differentially Private Mechanisms
This work studies the power of adversarial attacks against machine learning algorithms that use differentially private mechanisms as their weapon.
Ayşe Ünsal, Melek Önen
doaj +1 more source
DIGITAL SKILLS – AN ASSET FOR FUTURE ACCOUNTING PROFESSIONALS. ANALYSIS OF ROMANIA’S POSITIONING WITHIN THE EU MEMBER STATES [PDF]
Globalisation, digitisation and technological advances describe the present and future of accounting. In order for accounting professionals to remain always connected to the present and prepared for the future, they constantly need to update their ...
Veronica MÎȚA, Mariana MAN
doaj +1 more source
A survey on cyber security for smart grid communications [PDF]
A smart grid is a new form of electricity network with high fidelity power-flow control, self-healing, and energy reliability and energy security using digital communications and control technology. To upgrade an existing power grid into a smart grid, it
Qian, Y, Sharif, H, Tipper, D, Yan, Y
core +1 more source
A novel single-crystal & single-pass source for polarisation- and colour-entangled photon pairs
We demonstrate a new generation mechanism for polarisation- and colour-entangled photon pairs. In our approach we tailor the phase-matching of a periodically poled KTP crystal such that two downconversion processes take place simultaneously.
Fabian Laudenbach +4 more
doaj +1 more source
Recent developments enable biometric recognition systems to be available as mobile solutions or to be even integrated into modern smartphone devices. Thus, smartphone devices can be used as mobile fingerprint image acquisition devices, and it has become ...
Christof Kauba +6 more
doaj +1 more source
Under false flag: using technical artifacts for cyber attack attribution
The attribution of cyber attacks is often neglected. The consensus still is that little can be done to prosecute the perpetrators – and unfortunately, this might be right in many cases. What is however only of limited interest for the private industry is
Florian Skopik, Timea Pahi
doaj +1 more source
Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey
Smart technologies, such as the Internet of Things (IoT), cloud computing, and artificial intelligence (AI), are being adopted in cities and transforming them into smart cities. In smart cities, various network technologies, such as the Internet and IoT,
Kyounggon Kim +5 more
doaj +1 more source

