Results 101 to 110 of about 37,820 (242)

Hardware-based Security for Virtual Trusted Platform Modules

open access: yes, 2013
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in ...
Alsouri, Sami   +3 more
core  

A Private Blockchain and IPFS‐Based Secure and Decentralized Framework for People Surveillance via Deep Learning Techniques

open access: yesIET Software, Volume 2026, Issue 1, 2026.
The modern metropolis essentially demands the use of state‐of‐the‐art, real‐time surveillance systems, which should be reliable, scalable, and respectful of privacy at the same time. Critical shortcomings in traditional architectures are single points of failure, poor scalability, frequent data breaches, and inadequately managed privacy.
Shihab Sarar   +4 more
wiley   +1 more source

Cryptographic Techniques in Digital Media Security: Current Practices and Future Directions

open access: yesInternational Journal of Advanced Computer Science and Applications
—Content privacy and unauthorized access to copyrighted digital media content are common in the dynamic, fast-paced digitalized media marketplace.
Gongling Zhang
semanticscholar   +1 more source

Forensic analysis and evaluation of file‐wiping applications in Android OS

open access: yesJournal of Forensic Sciences, Volume 71, Issue 1, Page 338-352, January 2026.
Abstract Anti‐forensics refers to techniques designed to obstruct the discovery of evidence in digital forensic investigations. File‐wiping is one of the anti‐forensic techniques that make data recovery impossible by overwriting data with specific patterns. This technique poses significant challenges to investigators.
Dong Bin Oh   +6 more
wiley   +1 more source

Post‐Quantum Digital Signatures for Enhanced Medical Image Security

open access: yesIET Quantum Communication
Traditional encryption methods face significant challenges due to the rapid advancement of quantum computing, necessitating the use of quantum‐resistant solutions.
Kumar Sekhar Roy   +5 more
doaj   +1 more source

An optimistic fair e-commerce protocol for large e-goods [PDF]

open access: yes, 2006
Suppose two entities that do not trust each other want to exchange some arbitrary data over a public channel. A fair exchange protocol ensures that both parties get what they want or neither gets anything.
Levi, Albert   +4 more
core  

Forensic detection of medical image manipulation using PACS and DICOM artifacts

open access: yesJournal of Forensic Sciences, Volume 71, Issue 1, Page 371-387, January 2026.
Abstract With the digitization of medical information, illegal activities such as medical crimes and insurance fraud through tampering have increased. Medical images are particularly vulnerable due to their nature as soft copies and their transmission over networks.
Sojung Oh   +5 more
wiley   +1 more source

Frontiers of Blockchain Applications in HRM: An Exploration Through Theoretical Integration and Qualitative Inquiry

open access: yesAsia Pacific Journal of Human Resources, Volume 64, Issue 1, January 2026.
ABSTRACT Blockchain technology is a disruptive technology known for its use in financial services, supply chains and cryptocurrencies; however, it remains relatively underutilised in human resource management (HRM). This study aims to explore current and potential future uses of blockchain in strategic and operational HRM and examines the enablers and ...
Patricia Iglesias   +2 more
wiley   +1 more source

The Myths of Blockchain Governance

open access: yesCorporate Governance: An International Review, Volume 34, Issue 1, Page 154-162, January 2026.
ABSTRACT Research Question/Issue Blockchain technology promises to revolutionize governance through strong commitments, trustlessness, and transparency. This paper examines how these promises have failed to materialize in practice. Research Findings/Insights Drawing on case evidence from major blockchains, including Bitcoin and Ethereum, I argue that ...
Daniel Ferreira
wiley   +1 more source

Home - About - Disclaimer - Privacy