Results 81 to 90 of about 3,148 (188)
The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information.
Al-Khateeb, Wajdi F. +6 more
core
Telecommunication Network Security [PDF]
YesOur global age is practically defined by the ubiquity of the Internet; the worldwide interconnection of cyber networks that facilitates accessibility to virtually all ICT and other elements of critical infrastructural facilities, with a click of a ...
Abd-Alhameed, Raed +2 more
core
Searchable public key encryption with designated verifier secure against the server
In designated verifier searchable public key encryption (dPEKS) schemes,the IND-KGA-SERVER security was proposed to formalize the security against the server.Based on the IND-KGA secure dPEKS,the CA (certificate authority),and the strongly unforgeable ...
Zhi-yi SHAO +3 more
doaj +2 more sources
To address the challenges of secure data retrieval and sharing in the industrial Internet of things (IIoT), as well as the vulnerability to offline keyword guessing attacks when using public-key encrypted indexes, a blockchain-based user-friendly data ...
ZHANG Bo, LI Zhecheng, XU Xingshuai
doaj
The Network’s Data Security Risk Analysis [PDF]
Establishing the networks security risk can be a very difficult operation especially for the small companies which, from financial reasons can’t appeal at specialist in this domain, or for the medium or large companies that don’t have experience.
Emil BURTESCU
core
Freedom of Thought, Offensive Fantasies and the Fundamental Human Right to Hold Deviant Ideas: Why the Seventh Circuit Got it Wrong in Doe v. City of Lafayette, Indiana [PDF]
[Excerpt] “A precarious balance and considerable tension exists between two competing legal interests – the essential, First Amendment-grounded human right to freedom of thought, on the one hand, and the desire to prevent harm and injury that might occur
Calvert, Clay
core +1 more source
2007 Circumvention Landscape Report: Methods, Uses, and Tools [PDF]
As the Internet has exploded over the past fifteen years, recently reaching over a billion users, dozens of national governments from China to Saudi Arabia have tried to control the network by filtering out content objectionable to the countries for any ...
Palfrey, John +2 more
core
Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack
Satoshi Obana, Kaito Uemura
openaire +1 more source
Public-key authenticated encryption with keyword search (PAEKS) is a novel cryptographic primitive to resist against keyword-guessing attacks (KGAs) and preserve the privacy of keywords in both ciphertexts and trapdoors.
Nan Zhang, Baodong Qin, Dong Zheng
doaj +1 more source
The Industrial Internet of Things (IIoT) achieves the automation, monitoring, and optimization of industrial processes by interconnecting various sensors, smart devices, and the Internet, which dramatically increases productivity and product quality ...
Le Zhang +4 more
doaj +1 more source

