-
221
On the Security of Certificateless Signature Schemes
Published 2013-06-01“…CL-PKC has attracted special attention in the field of information security as it has opened new avenues for improvement in the present security architecture. …”
Get full text
Article -
222
Audio and Video Matching Zero-Watermarking Algorithm Based on NSCT
Published 2022-01-01“…In the Internet age, information security is threatened anytime and anywhere and the copyright protection of audio and video as well as the need for matching detection is increasingly strong. …”
Get full text
Article -
223
Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection
Published 2019-01-01“…Network and information security are regarded as some of the most pressing problems of contemporary economy, affecting both individual citizens and entire societies, making them a highlight for homeland security. …”
Get full text
Article -
224
Covert Channel Construction Method Based on HTTP Composite Protocols
Published 2022-01-01Get full text
Article -
225
RETRACTED: Parallel Encryption With Digit Arithmetic Of Covertext Model Using Duplicated Covertext
Published 2022-12-01“…Covertext loops applied in PDAC can process information security. Another advantage obtained is that this modification makes it easier for users to use PDAC without having to meet the minimum covertext requirement.…”
Get full text
Article -
226
-
227
Throughput-Optimal Scheduling for Cooperative Communications in Wireless Ad Hoc Networks
Published 2013-09-01Get full text
Article -
228
Nearly Quadratic n-Derivations on Non-Archimedean Banach Algebras
Published 2012-01-01Get full text
Article -
229
Advancement of Nanofibrous Mats and Common Useful Drug Delivery Applications
Published 2022-01-01Get full text
Article -
230
Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging
Published 2024-01-01“…Semiconductor integrated circuit (IC) chips are regularly exposed to physical attacks and faced to the compromise of information security. An attacker leverages Si substrate backside as the open surface of an IC chip in flip-chip packaging and explores the points of information leakage over the entire backside without being hampered by physical obstacles as well as applying invasive treatments. …”
Get full text
Article -
231
Safeguarding Mobile Users from Violation by Third-party Apps
Published 2025-01-01“…Insecure third-party mobile applications (apps) can have a detrimental impact on mobile users in terms of information security and data privacy. Insufficient protection for third-party mobile apps platforms may result in harmful installations. …”
Get full text
Article -
232
Multistage Encryption for Text Using Steganography and Cryptography
Published 2023-03-01“…Thus, important data must be encrypted during passing over a network so that information can only access by an intended receiver and processed by it. As a result, information security has become even more critical than before. …”
Get full text
Article -
233
An Efficient Data Analysis Framework for Online Security Processing
Published 2021-01-01Get full text
Article -
234
Theoretical and Experimental Demonstration on Grating Lobes of Liquid Crystal Optical Phased Array
Published 2016-01-01Get full text
Article -
235
Multiple-Feature Extracting Modules Based Leak Mining System Design
Published 2013-01-01“…Thus, we make use of practical verification in order to focus on information security and privacy through black-box testing.…”
Get full text
Article -
236
Downlink and Uplink Cooperative Transmission for Primary Secrecy Based Cognitive Radio Sensor Networks
Published 2015-10-01“…Aiming at allocating more licensed spectrum to wireless sensor nodes (SNs) under the constraint of the information security requirement of the primary system, in this paper, we propose a cooperative relaying and jamming secure transmission (CRJS) scheme in which SNs will relay primary message and jam primary eavesdrop concurrently with SN's downlink and uplink information transmission in cognitive radio sensor networks (CRSNs). …”
Get full text
Article -
237
-
238
SQLite Encryption Method for Embedded Databases Based on Chaos Algorithm
Published 2023-01-01“…It is an important topic in the field of information security at present, and it is an effective way to apply to embedded systems. …”
Get full text
Article -
239
Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks
Published 2015-01-01Get full text
Article -
240
Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
Published 2022-01-01“…It can be applied to enterprises, institutions, and departments that have higher requirements for intranet information security.…”
Get full text
Article