-
1
Diegif: An efficient and secured DICOM to EGIF conversion framework for confidentiality in machine learning training
Published 2025-03-01“…The Diegif framework aims to enhance storage efficiency by decreasing file sizes by 66.32%, thereby improving data transport efficacy and cloud storage affordability while preserving strong encryption for data confidentiality. …”
Get full text
Article -
2
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01“… Information security is paramount for individuals, companies, and governments. Threats to data confidentiality are increasingly complex, demanding strong protection. …”
Get full text
Article -
3
Cloud storage scheme based on closed-box encryption
Published 2017-07-01“…Aiming at protecting the confidentiality of data for cloud storage users,a scheme that encrypt data in cloud service providers was presented.The scheme constructed a closed-box computing environment by virtual machine isolation technique,improved algorithm of RSA to change keys without having to produce large prime numbers,transfer data and keys through SSL and encrypted data in the closed computing environment before storing to the distributed file system.Closed-box computing environment can prevent attacks from cloud administrators and malicious applications in the operating system.It also can guard against data leakage effectively.The result of experiment shows that the confidentiality of data improved and the performance loss is decreased considering to other cloud storage scheme that encrypt data in cloud.…”
Get full text
Article -
4
Pengamanan Citra Berwarna Menggunakan Kriptografi Visual Skema Meaningful Shares dan Steganografi LSB
Published 2022-12-01“…Abstract Information security is important so that files that are confidential can be protected from unauthorized persons, therefor there is Cryptography and Steganograph. …”
Get full text
Article -
5
A New Data Coding Algorithm for Secure Communication of Image
Published 2024-11-01Get full text
Article -
6
Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
Published 2022-01-01“…The system can realize the remote acquisition and real-time monitoring of the network access, file system operation, system operation status, and other information of the controlled computer. …”
Get full text
Article -
7
Application of Classical and Genomic Cryptography on Textual Dataset
Published 2024-12-01“…Cryptology is one of the methods used when sharing confidential or private data over any communication network that poses a security risk. …”
Get full text
Article -
8
Management of Records and Clients Satisfaction at Magistrate Court at Kabale.
Published 2023“…This includes keeping files in soft copy devices as well as computers tapes, flash disks and computer disks. …”
Get full text
Thesis -
9
Record Keeping Practices at Kabale University Central Registry.
Published 2024“…The findings revealed that the types of records maintained at the Central Registry included; confidential and open records. they included minutes of meetings, financial statements, employment and open records containing historical records, and incoming and outgoing mail, the findings revealed that several preservation measures such as photocopying, microfilming, lamination, use of acid-free boxes, digitization, and offsite storage were very essential in record keeping in Kabale University Central Registry, the research findings revealed that disposition methods used in the Central Registry included; burning, shredding and archiving and from the research findings, it was revealed that there are several challenges associated to the access of records by clients which include; misplacement of files, loss of sums of money, lack of record keeping awareness, shortage of storage facilities, cost in managing records, the absence of legislation and policies, the lack of adequate training. …”
Get full text
Thesis -
10
Multi-user collaborative access control scheme in cloud storage
Published 2016-01-01“…However, it was just fit for reading or modifying different data files respectively. When CP-ABE was applied directly to data access collaborative control by multiple users, there would be such problems as data being modified disorderly.When multiple users access collaboratively the data stored on the cloud, legitimate users should modify the same ciphertext file orderly on the premise of confidentiality and collusion-resistance and the copies of ciphertext file should be generated as few as possible. …”
Get full text
Article -
11
Method of privacy protection based on multiple edge servers in personalized search
Published 2019-02-01“…In the plaintext environment,users' personalized search results can be obtained through users' interest model and query keywords.However,it may possibly result in the disclosure of sensitive data and privacy,which prevents using sensitive data in cloud search.Therefore,data is generally stored in the form of ciphertext in the cloud server.In the process of cloud search service,users intend to quickly obtain the desired search results from the vast amount of ciphertext.In order to solve the problem,it was proposed that a method of privacy protection based on multiple edge servers in personalized search shall be used.By introducing multiple edge servers and cutting the index as well as the query matrix,the computing relevance scores of partial query and partial file index are achieved on the edge server.The cloud server only needs to get the relevance score on the edge server and make a simple processing that can return to the most relevant Top K files by user query,so as to make it particularly suitable for a large number of users in the massive personalized ciphertext search.Security analysis and experimental results show that this method can effectively protect users’ privacy and data confidentiality.In addition,it can guarantee high efficiency in search to provide better personalized search experience.…”
Get full text
Article -
12
Electronic invoice public verification scheme based on SM2 coalition signature algorithm
Published 2022-04-01“…In order to solve the current problems of electronic invoices, such as anti-counterfeiting, privacy leakage and low verification efficiency, an electronic invoice public verification architecture based on the national signature algorithm was proposed.Electronic invoice documents have complex data sources, sensitive user information on the ticket surface, frequent data flow and other characteristics as well as the demand for efficient public verification.Based on these motivations, the e-invoice generation and verification protocol was designed.Besides, a signature code generation scheme for invoice anti-counterfeiting was proposed based on certificate-free joint signature.Then multiple data verification and signatures of the invoicing party and the taxation authority can be realized.All kinds of invoice holders can not only verify the authenticity and data integrity of electronic invoices, but also publicly check the authenticity and data integrity of electronic invoices.The integration of data encryption algorithms protects user privacy data in electronic invoices, and at the same time can fulfill the requirements for authenticity or status verification under various invoice application scenarios.The checking party only needs to verify one signature to confirm the authenticity of the electronic invoice signed by both parties.Scyther security simulation tools were used to analyze the security of the proposed solution, which can verify the integrity and authenticity of the data source and check the confidentiality of the privacy data under various types of attacks.Compared with a typical overseas e-invoice checking scheme and a similar digital signature-based e-invoice checking scheme, the proposed scheme has obvious advantages in terms of checking efficiency and invoice file size.…”
Get full text
Article -
13
Implementation outcomes of HIV self-testing in low- and middle- income countries: A scoping review.
Published 2021-01-01Get full text
Article -
14
Cross-border data sharing through the lens of research ethics committee members in sub-Saharan Africa.
Published 2024-01-01Get full text
Article -
15
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01“…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
Get full text
Article -
16
Generating Encrypted Document Index Structure Using Tree Browser
Published 2023-06-01“…Hence, a new indexing structure named tree browser (TB) was proposed in this paper to be applied to index files of the large document set in an encrypted manner. …”
Get full text
Article -
17
A Secure Application for Information Sharing i n Organizations: A Case Study of Kabale District Local Government
Published 2019“…Information shared is exposed to threats of confidentiality, integrity and availability needed for decision making in org anizations. …”
Get full text
Article -
18
Annotation of Software Requirements Specification (SRS), Extractions of Nonfunctional Requirements, and Measurement of Their Tradeoff
Published 2019-01-01“…Software requirement artifacts such as manuals request for proposals, and software requirements specification (SRS) are commonly focused on functional requirements. In most SRS files, nonfunctional requirements do not formally encoded or encoded as a whole, not for an individual design problem. …”
Get full text
Article -
19
Technical, forensic and organisational aspects of work with Monero cryptocurrency
Published 2023-09-01“…The reasons and trends of Monero use by offenders are identified, and the scheme of operation of this payment system, which ensures its increased confidentiality, is shown. Examples of criminal offences in which Monero is used are presented. …”
Get full text
Article -
20
Synesis as a framework to enable safety interventions in complex healthcare environments
Published 2025-01-01“…Measures included process—completion of review, team engagement, proportion of ‘open’ (those without action plan) reports within 1 month of filing; outcome—number of actions launched and completed, dissemination of actions and postintervention survey results; and balancing—resources invested.Results 26 multidisciplinary leaders reviewed 3175 of the 3406 total reported SERs across four clinical units over 18 months. …”
Get full text
Article