Results 41 to 50 of about 1,020 (118)
Technological advancements in high-performance electronics have fueled the development of cutting-edge medical applications, leading to exponential growth in effective treatment and diagnostic solutions for various medical problems.
Kusum Lata +3 more
doaj +1 more source
Diseño y desarrollo de una herramienta para análisis forense de backups de dispositivos Iphone [PDF]
El uso de los dispositivos móviles se extiende día a día convirtiéndose en el medio principal de la mayoría de las personas para comunicarse, gestionar sus tareas diarias, guardar información personal o gastar su tiempo de ocio.
Señor Palazuelo, Adrián
core
On time-memory trade-offs for password hashing schemes
A password hashing algorithm is a cryptographic method that transforms passwords into a secure and irreversible format. It is used not only for authentication purposes but also for key derivation mechanisms.
Ayse Nurdan Saran
doaj +1 more source
PALPAS - PAsswordLess PAssword Synchronization
Tools that synchronize passwords over several user devices typically store the encrypted passwords in a central online database. For encryption, a low-entropy, password-based key is used.
Buchmann, Johannes +2 more
core +2 more sources
Deep Learning-Based Brain Tumor Detection in Privacy-Preserving Smart Health Care Systems
Deep learning has been widely used in medical image processing, which has sparked the development of a wide range of applications and led to a notable increase in the number of therapeutic and diagnostic options available for a range of medical imaging ...
Kusum Lata +3 more
doaj +1 more source
Information-Theoretic Security for the Masses [PDF]
We combine interactive zero-knowledge protocols and weak physical layer randomness properties to construct a protocol which allows bootstrapping an IT-secure and PF-secure channel from a memorizable shared secret.
Nikitin, Oleksandr
core
Evaluation of Professional Cloud Password Management Tools [PDF]
Strong passwords have been preached since decades. However, lot of the regular users of IT systems resort to simple and repetitive passwords, especially nowadays in the “service era”.
Dragoni, Nicola +2 more
core +2 more sources
Multi-Factor Authentication for In-Vehicle Secure OTA Protocol
As advancements in vehicle electronics and intelligence accelerate, the number of electronic control units (ECUs) is rapidly increasing, thereby heightening the likelihood of errors and cyberattacks.
Hyeonseong Kim, Sanghoon Jeon
doaj +1 more source
Bootbandit: A macOS Bootloader Attack [PDF]
Full disk encryption (FDE) is used to protect a computer system against data theft by physical access. If a laptop or hard disk drive protected with FDE is stolen or lost, the data remains unreadable without the encryption key.
Boursalian, Armen
core +1 more source
Administration application with Angular, Node and Express for a Django application [PDF]
En este trabajo de fin de grado se ha desarrollado una aplicación de administración que sustituye a las que ofrecen por defecto las aplicaciones creadas con el framework de desarrollo web Django.
Carreño Villalba, Rubén
core

