Results 81 to 90 of about 3,148 (188)

Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques

open access: yes, 2009
The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information.
Al-Khateeb, Wajdi F.   +6 more
core  

Telecommunication Network Security [PDF]

open access: yes, 2015
YesOur global age is practically defined by the ubiquity of the Internet; the worldwide interconnection of cyber networks that facilitates accessibility to virtually all ICT and other elements of critical infrastructural facilities, with a click of a ...
Abd-Alhameed, Raed   +2 more
core  

Searchable public key encryption with designated verifier secure against the server

open access: yesTongxin xuebao, 2014
In designated verifier searchable public key encryption (dPEKS) schemes,the IND-KGA-SERVER security was proposed to formalize the security against the server.Based on the IND-KGA secure dPEKS,the CA (certificate authority),and the strongly unforgeable ...
Zhi-yi SHAO   +3 more
doaj   +2 more sources

Blockchain-based user-friendly data retrieval and sharing scheme in cloud-assisted industrial Internet of things

open access: yesTongxin xuebao
To address the challenges of secure data retrieval and sharing in the industrial Internet of things (IIoT), as well as the vulnerability to offline keyword guessing attacks when using public-key encrypted indexes, a blockchain-based user-friendly data ...
ZHANG Bo, LI Zhecheng, XU Xingshuai
doaj  

The Network’s Data Security Risk Analysis [PDF]

open access: yes
Establishing the networks security risk can be a very difficult operation especially for the small companies which, from financial reasons can’t appeal at specialist in this domain, or for the medium or large companies that don’t have experience.
Emil BURTESCU
core  

Freedom of Thought, Offensive Fantasies and the Fundamental Human Right to Hold Deviant Ideas: Why the Seventh Circuit Got it Wrong in Doe v. City of Lafayette, Indiana [PDF]

open access: yes, 2005
[Excerpt] “A precarious balance and considerable tension exists between two competing legal interests – the essential, First Amendment-grounded human right to freedom of thought, on the one hand, and the desire to prevent harm and injury that might occur
Calvert, Clay
core   +1 more source

2007 Circumvention Landscape Report: Methods, Uses, and Tools [PDF]

open access: yes, 2009
As the Internet has exploded over the past fifteen years, recently reaching over a billion users, dozens of national governments from China to Saudi Arabia have tried to control the network by filtering out content objectionable to the countries for any ...
Palfrey, John   +2 more
core  

Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack

open access: yesProceedings of the 18th International Conference on Security and Cryptography, 2021
Satoshi Obana, Kaito Uemura
openaire   +1 more source

Cryptanalysis of Keyword Confidentiality in a Searchable Public-Key Encryption Scheme Against Malicious Server

open access: yesIET Information Security
Public-key authenticated encryption with keyword search (PAEKS) is a novel cryptographic primitive to resist against keyword-guessing attacks (KGAs) and preserve the privacy of keywords in both ciphertexts and trapdoors.
Nan Zhang, Baodong Qin, Dong Zheng
doaj   +1 more source

An improved secure designated server certificateless authenticated searchable encryption scheme for IIoT

open access: yesHigh-Confidence Computing
The Industrial Internet of Things (IIoT) achieves the automation, monitoring, and optimization of industrial processes by interconnecting various sensors, smart devices, and the Internet, which dramatically increases productivity and product quality ...
Le Zhang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy