Results 31 to 40 of about 1,020 (118)
Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study
Passwords are still a mainstay of various security systems, as well as the cause of many usability issues. For end-users, many of these issues have been studied extensively, highlighting problems and informing design decisions for better policies and ...
Acar Yasemin +22 more
core +1 more source
Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users.
da Rocha, Marciano +5 more
core +1 more source
PASSWORD HASHING METHODS AND ALGORITHMS ON THE .NET PLATFORM
Web applications, which are widely used to provide services and collect information, have become a major target for attackers, especially with the emergence of government services that process sensitive data.
Volodymyr Fedorchenko +4 more
doaj +1 more source
EthVault: A Secure and Resource‐Conscious FPGA‐Based Ethereum Cold Wallet
This work presents EthVault, the first hardware‐based Ethereum hierarchical deterministic cold wallet, featuring FPGA implementations of key cryptographic algorithms for secure key generation. A novel ECC architecture resilient to side‐channel and timing attacks, along with an efficient child key derivation function, are introduced. Implementation on a
Joel Poncha Lemayian +3 more
wiley +1 more source
An on‐chain trading model of real world asset backed digital assets
To bridge this gap between off‐chain and on‐chain economic systems, an on‐chain trading model was developed by leveraging key techniques, including HD key derivation, tokenization, oracle, DEX, parallel transactions based on DAG model. Abstract Metaverse is a digital value interaction network based on blockchain technology, with an important economic ...
Dongsheng Hou +5 more
wiley +1 more source
The rapid expansion of cloud computing underscores the critical need for advanced security measures to protect sensitive data on remote servers. Authentication is crucial for safeguarding these data.
K. Sasikumar, Sivakumar Nagarajan
doaj +1 more source
Performance challenges of decentralised services [PDF]
Decentralised, peer-to-peer based services present a variety of security and privacy benefits for their users, and highly scalable to cater for a growing numbers of users, without extra servers being required of the service operator.
Dubouilh, Pierre-Louis +2 more
core +1 more source
У статті проведено комплексне дослідження актуальних проблем парольної політики в сучасних інформаційно-комунікаційних системах. Обґрунтовано, що в умовах стрімкого розвитку комп’ютерної техніки та зростання обчислювальних можливостей зловмисників ...
Роман Штонда +2 more
doaj +1 more source
An approach to restrict viewing of media [PDF]
Nowadays, the issue of copyright infringement of media contents becomes more vital since the media content is published on the internet for easy access to users.Due to that, the authors’ work affect adversely if their work can be copied or downloaded ...
Abd Aziz, Norazah +1 more
core
Take control of your PC with UEFI secure boot [PDF]
UEFI secure boot is often regarded as a nuisance for Linux users, but you can use it to protect your system by taking control of it. Learn how to do this, sign your own bootloader, and protect your whole system with full disk encryption (including the ...
Irvine, James, Paul, Greig
core +1 more source

