Results 101 to 110 of about 37,820 (242)
Hardware-based Security for Virtual Trusted Platform Modules
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in ...
Alsouri, Sami +3 more
core
The modern metropolis essentially demands the use of state‐of‐the‐art, real‐time surveillance systems, which should be reliable, scalable, and respectful of privacy at the same time. Critical shortcomings in traditional architectures are single points of failure, poor scalability, frequent data breaches, and inadequately managed privacy.
Shihab Sarar +4 more
wiley +1 more source
A Novel Approach to Increase Security in AODV Using RSA Asymmetric Cryptography and Hash Function [PDF]
Utkarsh Mendevell
openalex +1 more source
Cryptographic Techniques in Digital Media Security: Current Practices and Future Directions
—Content privacy and unauthorized access to copyrighted digital media content are common in the dynamic, fast-paced digitalized media marketplace.
Gongling Zhang
semanticscholar +1 more source
Forensic analysis and evaluation of file‐wiping applications in Android OS
Abstract Anti‐forensics refers to techniques designed to obstruct the discovery of evidence in digital forensic investigations. File‐wiping is one of the anti‐forensic techniques that make data recovery impossible by overwriting data with specific patterns. This technique poses significant challenges to investigators.
Dong Bin Oh +6 more
wiley +1 more source
Post‐Quantum Digital Signatures for Enhanced Medical Image Security
Traditional encryption methods face significant challenges due to the rapid advancement of quantum computing, necessitating the use of quantum‐resistant solutions.
Kumar Sekhar Roy +5 more
doaj +1 more source
An optimistic fair e-commerce protocol for large e-goods [PDF]
Suppose two entities that do not trust each other want to exchange some arbitrary data over a public channel. A fair exchange protocol ensures that both parties get what they want or neither gets anything.
Levi, Albert +4 more
core
Forensic detection of medical image manipulation using PACS and DICOM artifacts
Abstract With the digitization of medical information, illegal activities such as medical crimes and insurance fraud through tampering have increased. Medical images are particularly vulnerable due to their nature as soft copies and their transmission over networks.
Sojung Oh +5 more
wiley +1 more source
ABSTRACT Blockchain technology is a disruptive technology known for its use in financial services, supply chains and cryptocurrencies; however, it remains relatively underutilised in human resource management (HRM). This study aims to explore current and potential future uses of blockchain in strategic and operational HRM and examines the enablers and ...
Patricia Iglesias +2 more
wiley +1 more source
The Myths of Blockchain Governance
ABSTRACT Research Question/Issue Blockchain technology promises to revolutionize governance through strong commitments, trustlessness, and transparency. This paper examines how these promises have failed to materialize in practice. Research Findings/Insights Drawing on case evidence from major blockchains, including Bitcoin and Ethereum, I argue that ...
Daniel Ferreira
wiley +1 more source

