Results 21 to 30 of about 1,768,773 (316)
Forensics and Anti-Forensics of a NAND Flash Memory: From a Copy-Back Program Perspective
This paper proposes a safe copy-back program operation in a NAND flash memory, which is targeting digital forensics for a variety of reasons. Due to the background management operation of the NAND flash memory, the original data is highly likely to ...
Na Young Ahn, Dong Hoon Lee
doaj +1 more source
AnonPri: A Secure Anonymous Private Authentication Protocol for RFID Systems [PDF]
Privacy preservation in RFID systems is a very important issue in modern day world. Privacy activists have been worried about the invasion of user privacy while using various RFID systems and services.
Ahamed, Sheikh Iqbal+2 more
core +3 more sources
Adversarial attack and defense in reinforcement learning-from AI security view
Reinforcement learning is a core technology for modern artificial intelligence, and it has become a workhorse for AI applications ranging from Atrai Game to Connected and Automated Vehicle System (CAV).
Tong Chen+5 more
doaj +1 more source
Integral Cryptanalysis of Lightweight Block Cipher PIPO
PIPO is a lightweight block cipher proposed at ICISC 2020, which has a byte-oriented structure suitable for bit-sliced implementation and allows for efficient higher-order masking implementations.
Sunyeop Kim+5 more
doaj +1 more source
Dual Privacy-Preserving Lightweight Navigation System for Vehicular Networks
As an indispensable part of intelligent transportation system, a traffic-sensitive navigation system can assist drivers in avoiding traffic congestion by providing navigation services.
Yingying Yao+4 more
doaj +1 more source
Gaming is an important pastime for young people to relax, socialize and have fun, but also to be challenged, show creativity and work together to achieve goals. The design of games can have an impact on their behavior. With the changing revenue models of
Simone van der Hof+4 more
doaj +1 more source
The purpose of this Chapter is to provide an overview of the legislative framework in relation to the fundamental right to privacy and its potential application in the border control context.
openaire +2 more sources
Numerical Evaluation of Job Finish Time Under MTD Environment
Moving target defense (MTD) has recently emerged as a game-changer in the confrontation between cyberattack and defense. MTD mechanism constantly and randomly changes the system configurations to create uncertainty of the attack surface against cyber ...
Zhi Chen+3 more
doaj +1 more source
Balancing smartness and privacy for the Ambient Intelligence [PDF]
Ambient Intelligence (AmI) will introduce large privacy risks. Stored context histories are vulnerable for unauthorized disclosure, thus unlimited storing of privacy-sensitive context data is not desirable from the privacy viewpoint.
Anciaux, Nicolas+3 more
core +7 more sources