Forensic analysis and evaluation of file-wiping applications in Android OS. [PDF]
Abstract Anti‐forensics refers to techniques designed to obstruct the discovery of evidence in digital forensic investigations. File‐wiping is one of the anti‐forensic techniques that make data recovery impossible by overwriting data with specific patterns. This technique poses significant challenges to investigators.
Oh DB +6 more
europepmc +2 more sources
A Stream based Implementation of Secured SOA Model using XML Encryption and XML Signature
Vijay Kumar F G +3 more
openaire +2 more sources
Steganography in XML Files Using RC4 Stream Encryption Algorithm
Binnu Paul
openaire +2 more sources
Intelligent Banking XML Encryption Using Effective Fuzzy Classification [PDF]
In this chapter we present a novel approach for securing financial XML transactions using an effective and intelligent fuzzy classification technique. Our approach defines the process of classifying XML content using a set of fuzzy variables. Upon fuzzy classification phase, a unique value is assigned to a defined attribute named "ImportanceLevel ...
Ammari, Faisal T. +2 more
openaire +1 more source
Adeno‐associated virus serotype 2 capsid variants for improved liver‐directed gene therapy
Abstract Background and Aims Current liver‐directed gene therapies look for adeno‐associated virus (AAV) vectors with improved efficacy. With this background, capsid engineering is explored. Whereas shuffled capsid library screenings have resulted in potent liver targeting variants with one first vector in human clinical trials, modifying natural ...
Nadja Meumann +25 more
wiley +1 more source
An Approach for Securing JSON Objects through Chaotic Synchronization
Nowadays the interoperability of web applications is carried out by the use of data exchange formats such as XML and JavaScript Object Notation (JSON).
Gómez Omar S. +3 more
doaj +1 more source
Protection of Semantic Organized Data. Encryption of RDF Graph
The problems of protection of semantic organized data and encryption of RDF graph are investigated. Technologies used in the construction of a semantic network are presented.
Galina Bogdanova +2 more
doaj +1 more source
REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall +2 more
core +2 more sources
Rancang Bangun Keamanan Web Service Dengan Metode Ws-Security
Abstrak Web service menggunakan teknologi XML dalam melakukan pertukaran data. Umumnya penggunaan web service terjadi pertukaran data ataupun informasi penting yang perlu dijaga keamanannya.
Ari Muzakir, Ahmad Ashari
doaj +1 more source
Dynamic access-control policies on XML encrypted data [PDF]
The erosion of trust put in traditional database servers and in Database Service Providers and the growing interest for different forms of selective data dissemination are different factors that lead to move the access-control from servers to clients. Different data encryption and key dissemination schemes have been proposed to serve this purpose.
Bouganim, Luc +2 more
openaire +3 more sources

