Results 51 to 60 of about 14,261,936 (322)

Fault Template Attack Based on Fault Probability

open access: yesIEEE Access, 2023
Template attack uses leaked information from various side channels and may break out the countermeasures embedded in the algorithm, which is considered a powerful side-channel attack method.
Tong Wu, Dawei Zhou, Lei Du, Shiwei Wang
doaj   +1 more source

Information Security management: A human challenge? [PDF]

open access: yes, 2008
This paper considers to what extent the management of Information Security is a human challenge. It suggests that the human challenge lies in accepting that individuals in the organisation have not only an identity conferred by their role but also a ...
Ashenden, Debi
core   +1 more source

Low-rate Denial of Service attack detection method based on time-frequency characteristics

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2022
In this paper, a real cloud computing platform-oriented Low-rate Denial of Service (LDoS) attack detection method based on time-frequency characteristics of traffic data is proposed.
Yu Fu, Xueyuan Duan, Kun Wang, Bin Li
doaj   +1 more source

VeloCash: Anonymous Decentralized Probabilistic Micropayments With Transferability

open access: yesIEEE Access, 2022
Micropayments are one of the challenges in cryptocurrencies. Micropayments on the blockchain have the problem that the fee is high for the transfer amount.
Taisei Takahashi   +2 more
doaj   +1 more source

On the Performance Analysis for CSIDH-Based Cryptosystems

open access: yesApplied Sciences, 2020
In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange ...
Donghoe Heo   +3 more
doaj   +1 more source

AHP–TOPSIS integration extended with Pythagorean fuzzy sets for information security risk analysis

open access: yesComplex & Intelligent Systems, 2018
Risk analysis (RA) contains several methodologies that object to ensure the protection and safety of occupational stakeholders. Multi attribute decision-making (MADM) is one of the most important RA methodologies that is applied to several areas from ...
M. Fatih Ak, Muhammet Gul
semanticscholar   +1 more source

Information Warfare, Threats and Information Security

open access: yesMGIMO Review of International Relations, 2014
The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security.
M. A. Kazakov, D. N. Bespalov
openaire   +6 more sources

SCDIS-210 Information Security Technology Coverage Measurement Standards [PDF]

open access: yes, 2015
These standards establish a simplified and consistent measurement for coverage of each of the security technologies listed therein. These standards are to be used for all South Carolina state agencies, including institutions, departments, divisions ...
Division of Information Security, Division of Technology State of South Carolina – Information Security Program
core  

MKTN: Adversarial-Based Multifarious Knowledge Transfer Network from Complementary Teachers

open access: yesInternational Journal of Computational Intelligence Systems
With the demands for light deep networks models in various front-end devices, network compression has attracted increasing interest for reducing model sizes yet without sacrificing much model accuracy.
Xiaobing Zhang   +3 more
doaj   +1 more source

On the Impact of Perceived Vulnerability in the Adoption of Information Systems Security Innovations [PDF]

open access: yesInternational Journal of Computer Network and Information Security(IJCNIS), 2019, 2019
A number of determinants predict the adoption of Information Systems (IS) security innovations. Amongst, perceived vulnerability of IS security threats has been examined in a number of past explorations. In this research, we examined the processes pursued in analysing the relationship between perceived vulnerability of IS security threats and the ...
arxiv   +1 more source

Home - About - Disclaimer - Privacy