Results 21 to 30 of about 1,362,310 (293)

Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2018
Cryptographic hashing modes come in many flavors, including Merkle-Damgård with various types of strengthening, Merkle trees, and sponge functions. As underlying primitives, these functions use arbitrary functions, permutations, or block ciphers. In this
Joan Daemen   +2 more
doaj   +1 more source

Security Attributes Based Digital Rights Management [PDF]

open access: yes, 2002
Most real-life systems delegate responsibilities to different authorities. We apply this model to a digital rights management system, to achieve flexible security.
C. N. Chong   +6 more
core   +6 more sources

Column Parity Mixers

open access: yesIACR Transactions on Symmetric Cryptology, 2018
We present column parity mixers (CPM), a generalization of the Θ mixing layer that is used in Keccak. Thanks to our description using matrix arithmetic, we can easily derive algebraic, diffusion, and mask propagation properties, leading to a surprising ...
Ko Stoffelen, Joan Daemen
doaj   +1 more source

Calibrating the Attack to Sensitivity in Differentially Private Mechanisms

open access: yesJournal of Cybersecurity and Privacy, 2022
This work studies the power of adversarial attacks against machine learning algorithms that use differentially private mechanisms as their weapon.
Ayşe Ünsal, Melek Önen
doaj   +1 more source

DIGITAL SKILLS – AN ASSET FOR FUTURE ACCOUNTING PROFESSIONALS. ANALYSIS OF ROMANIA’S POSITIONING WITHIN THE EU MEMBER STATES [PDF]

open access: yesAnnals of the University of Oradea: Economic Science, 2023
Globalisation, digitisation and technological advances describe the present and future of accounting. In order for accounting professionals to remain always connected to the present and prepared for the future, they constantly need to update their ...
Veronica MÎȚA, Mariana MAN
doaj   +1 more source

A survey on cyber security for smart grid communications [PDF]

open access: yes, 2012
A smart grid is a new form of electricity network with high fidelity power-flow control, self-healing, and energy reliability and energy security using digital communications and control technology. To upgrade an existing power grid into a smart grid, it
Qian, Y, Sharif, H, Tipper, D, Yan, Y
core   +1 more source

A novel single-crystal & single-pass source for polarisation- and colour-entangled photon pairs

open access: yesScientific Reports, 2017
We demonstrate a new generation mechanism for polarisation- and colour-entangled photon pairs. In our approach we tailor the phase-matching of a periodically poled KTP crystal such that two downconversion processes take place simultaneously.
Fabian Laudenbach   +4 more
doaj   +1 more source

Towards Using Police Officers’ Business Smartphones for Contactless Fingerprint Acquisition and Enabling Fingerprint Comparison against Contact-Based Datasets

open access: yesSensors, 2021
Recent developments enable biometric recognition systems to be available as mobile solutions or to be even integrated into modern smartphone devices. Thus, smartphone devices can be used as mobile fingerprint image acquisition devices, and it has become ...
Christof Kauba   +6 more
doaj   +1 more source

Under false flag: using technical artifacts for cyber attack attribution

open access: yesCybersecurity, 2020
The attribution of cyber attacks is often neglected. The consensus still is that little can be done to prosecute the perpetrators – and unfortunately, this might be right in many cases. What is however only of limited interest for the private industry is
Florian Skopik, Timea Pahi
doaj   +1 more source

Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey

open access: yesSensors, 2023
Smart technologies, such as the Internet of Things (IoT), cloud computing, and artificial intelligence (AI), are being adopted in cities and transforming them into smart cities. In smart cities, various network technologies, such as the Internet and IoT,
Kyounggon Kim   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy