Showing 221 - 240 results of 332 for search '"information security"', query time: 0.07s Refine Results
  1. 221

    On the Security of Certificateless Signature Schemes by Gaurav Sharma, Suman Bala, Anil K. Verma

    Published 2013-06-01
    “…CL-PKC has attracted special attention in the field of information security as it has opened new avenues for improvement in the present security architecture. …”
    Get full text
    Article
  2. 222

    Audio and Video Matching Zero-Watermarking Algorithm Based on NSCT by Di Fan, Wenxue Sun, Huiyuan Zhao, Wenshuo Kang, Changzhi Lv

    Published 2022-01-01
    “…In the Internet age, information security is threatened anytime and anywhere and the copyright protection of audio and video as well as the need for matching detection is increasingly strong. …”
    Get full text
    Article
  3. 223

    Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection by Rafał Kozik, Marek Pawlicki, Michał Choraś, Witold Pedrycz

    Published 2019-01-01
    “…Network and information security are regarded as some of the most pressing problems of contemporary economy, affecting both individual citizens and entire societies, making them a highlight for homeland security. …”
    Get full text
    Article
  4. 224
  5. 225

    RETRACTED: Parallel Encryption With Digit Arithmetic Of Covertext Model Using Duplicated Covertext by Hari Murti, Edy Supriyanto, Rara Redjeki, Eka Ardhianto

    Published 2022-12-01
    “…Covertext loops applied in PDAC can process information security. Another advantage obtained is that this modification makes it easier for users to use PDAC without having to meet the minimum covertext requirement.…”
    Get full text
    Article
  6. 226
  7. 227
  8. 228
  9. 229
  10. 230

    Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging by Makoto Nagata, Takuji Miki

    Published 2024-01-01
    “…Semiconductor integrated circuit (IC) chips are regularly exposed to physical attacks and faced to the compromise of information security. An attacker leverages Si substrate backside as the open surface of an IC chip in flip-chip packaging and explores the points of information leakage over the entire backside without being hampered by physical obstacles as well as applying invasive treatments. …”
    Get full text
    Article
  11. 231

    Safeguarding Mobile Users from Violation by Third-party Apps by Vusumuzi Malele, Kagiso Mphasane

    Published 2025-01-01
    “…Insecure third-party mobile applications (apps) can have a detrimental impact on mobile users in terms of information security and data privacy. Insufficient protection for third-party mobile apps platforms may result in harmful installations. …”
    Get full text
    Article
  12. 232

    Multistage Encryption for Text Using Steganography and Cryptography by Mohammed Majid Msallam, Fayez Aldoghan

    Published 2023-03-01
    “…Thus, important data must be encrypted during passing over a network so that information can only access by an intended receiver and processed by it. As a result, information security has become even more critical than before. …”
    Get full text
    Article
  13. 233
  14. 234
  15. 235

    Multiple-Feature Extracting Modules Based Leak Mining System Design by Ying-Chiang Cho, Jen-Yi Pan

    Published 2013-01-01
    “…Thus, we make use of practical verification in order to focus on information security and privacy through black-box testing.…”
    Get full text
    Article
  16. 236

    Downlink and Uplink Cooperative Transmission for Primary Secrecy Based Cognitive Radio Sensor Networks by Dawei Wang, Pinyi Ren, Qinghe Du, Li Sun, Yichen Wang

    Published 2015-10-01
    “…Aiming at allocating more licensed spectrum to wireless sensor nodes (SNs) under the constraint of the information security requirement of the primary system, in this paper, we propose a cooperative relaying and jamming secure transmission (CRJS) scheme in which SNs will relay primary message and jam primary eavesdrop concurrently with SN's downlink and uplink information transmission in cognitive radio sensor networks (CRSNs). …”
    Get full text
    Article
  17. 237
  18. 238

    SQLite Encryption Method for Embedded Databases Based on Chaos Algorithm by Junlong Shi

    Published 2023-01-01
    “…It is an important topic in the field of information security at present, and it is an effective way to apply to embedded systems. …”
    Get full text
    Article
  19. 239
  20. 240

    Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology by Xiaokun Zheng

    Published 2022-01-01
    “…It can be applied to enterprises, institutions, and departments that have higher requirements for intranet information security.…”
    Get full text
    Article