Results 11 to 20 of about 367,444 (216)

Rentable CDN Using Blockchain and Proof of Provenance

open access: yesApplied Sciences, 2020
Building a rentable content delivery network (CDN), a p2p based CDN that supports content control and is composed of hardware rented from consumers, requires significant trust between the renters and consumers.
Suah Kim   +2 more
doaj   +1 more source

Power-Balancing Software Implementation to Mitigate Side-Channel Attacks without Using Look-Up Tables

open access: yesApplied Sciences, 2020
With the increasing number of side-channel attacks, countermeasure designers continue to develop various implementations to address such threats. Power-balancing (PB) methods hold the number of 1s and/or transitions (i.e., Hamming weight/distance) of ...
HanBit Kim, HeeSeok Kim, Seokhie Hong
doaj   +1 more source

An Exploratory Study on the Taiwanese Primary and Secondary School Teachers’ Understanding of Personal Data Protection Act [PDF]

open access: yesJiàoyù zīliào yǔ túshūguǎn xué, 2021
In this study, the researchers would like to explore Taiwanese primary and secondary school teachers’ understanding on the provisions of the Personal Data Protection Act (hereinafter referred to as “PDPA”).
Mei-Lien Hsueh, Chien Chou
doaj   +1 more source

Delivering Smart Governance in a Future City: The Case of Glasgow

open access: yesMedia and Communication, 2018
In 2013, Glasgow City Council received significant funding to develop innovative smart city applications, including the delivery of new electronic public services and the co-production of governance.
Charles Leleux, C. William R. Webster
doaj   +1 more source

Forensic Issues and Techniques to Improve Security in SSD With Flex Capacity Feature

open access: yesIEEE Access, 2021
Over-provisioning technology is typically introduced as a means to improve the performance of storage systems, such as databases. The over-provisioning area is both hidden and difficult for normal users to access.
Na Young Ahn, Dong Hoon Lee
doaj   +1 more source

A Multi-Component Analysis of CPTED in the Cyberspace Domain

open access: yesSensors, 2020
The visual fidelity of a virtual environment lacks the exceedingly complex layers from the physical world, but the continuous improvements of image rendering technology and computation powers have led to greater demands for virtual simulations. Our study
Jemin Justin Lee   +7 more
doaj   +1 more source

Privacy constrained information processing [PDF]

open access: yes2015 54th IEEE Conference on Decision and Control (CDC), 2015
will appear in CDC ...
Akyol, Emrah   +2 more
openaire   +2 more sources

Single Trace Side Channel Analysis on NTRU Implementation

open access: yesApplied Sciences, 2018
As researches on the quantum computer have progressed immensely, interests in post-quantum cryptography have greatly increased. NTRU is one of the well-known algorithms due to its practical key sizes and fast performance along with the resistance against
Soojung An   +4 more
doaj   +1 more source

A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure

open access: yesIEEE Access, 2020
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee   +3 more
doaj   +1 more source

Balancing Personal Privacy and Public Safety During COVID-19: The Case of South Korea

open access: yesIEEE Access, 2020
There has been vigorous debate on how different countries responded to the COVID-19 pandemic. To secure public safety, South Korea actively used personal information at the risk of personal privacy whereas France encouraged voluntary cooperation at the ...
Na Young Ahn   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy