Results 11 to 20 of about 18,387 (191)

Forensic analysis and evaluation of file-wiping applications in Android OS. [PDF]

open access: yesJ Forensic Sci
Abstract Anti‐forensics refers to techniques designed to obstruct the discovery of evidence in digital forensic investigations. File‐wiping is one of the anti‐forensic techniques that make data recovery impossible by overwriting data with specific patterns. This technique poses significant challenges to investigators.
Oh DB   +6 more
europepmc   +2 more sources

A Stream based Implementation of Secured SOA Model using XML Encryption and XML Signature

open access: bronzeInternational Journal of Computer Applications, 2014
Vijay Kumar F G   +3 more
openaire   +2 more sources

Steganography in XML Files Using RC4 Stream Encryption Algorithm

open access: bronzeInternational Journal for Research in Applied Science and Engineering Technology, 2018
Binnu Paul
openaire   +2 more sources

Intelligent Banking XML Encryption Using Effective Fuzzy Classification [PDF]

open access: closed, 2014
In this chapter we present a novel approach for securing financial XML transactions using an effective and intelligent fuzzy classification technique. Our approach defines the process of classifying XML content using a set of fuzzy variables. Upon fuzzy classification phase, a unique value is assigned to a defined attribute named "ImportanceLevel ...
Ammari, Faisal T.   +2 more
openaire   +1 more source

Adeno‐associated virus serotype 2 capsid variants for improved liver‐directed gene therapy

open access: yesHepatology, EarlyView., 2022
Abstract Background and Aims Current liver‐directed gene therapies look for adeno‐associated virus (AAV) vectors with improved efficacy. With this background, capsid engineering is explored. Whereas shuffled capsid library screenings have resulted in potent liver targeting variants with one first vector in human clinical trials, modifying natural ...
Nadja Meumann   +25 more
wiley   +1 more source

An Approach for Securing JSON Objects through Chaotic Synchronization

open access: yesCybernetics and Information Technologies, 2022
Nowadays the interoperability of web applications is carried out by the use of data exchange formats such as XML and JavaScript Object Notation (JSON).
Gómez Omar S.   +3 more
doaj   +1 more source

Protection of Semantic Organized Data. Encryption of RDF Graph

open access: yesDigital Presentation and Preservation of Cultural and Scientific Heritage, 2014
The problems of protection of semantic organized data and encryption of RDF graph are investigated. Technologies used in the construction of a semantic network are presented.
Galina Bogdanova   +2 more
doaj   +1 more source

REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]

open access: yes, 2020
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall   +2 more
core   +2 more sources

Rancang Bangun Keamanan Web Service Dengan Metode Ws-Security

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2012
Abstrak Web service menggunakan teknologi XML dalam melakukan pertukaran data. Umumnya penggunaan web service terjadi pertukaran data ataupun informasi penting yang perlu dijaga keamanannya.
Ari Muzakir, Ahmad Ashari
doaj   +1 more source

Dynamic access-control policies on XML encrypted data [PDF]

open access: yesACM Transactions on Information and System Security, 2008
The erosion of trust put in traditional database servers and in Database Service Providers and the growing interest for different forms of selective data dissemination are different factors that lead to move the access-control from servers to clients. Different data encryption and key dissemination schemes have been proposed to serve this purpose.
Bouganim, Luc   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy