42   Artículos

« Anterior     Página: 1 de 3     Siguiente »

 
en línea
Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi and Amna Eleyan    
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Kaimeng Ding, Shiping Chen, Jiming Yu, Yanan Liu and Jie Zhu    
Aiming at the deficiency that blockchain technology is too sensitive to the binary-level changes of high resolution remote sensing (HRRS) images, we propose a new subject-sensitive hashing algorithm specially for HRRS image blockchains. To implement this... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Xingang Zhang, Haowen Yan, Liming Zhang and Hao Wang    
Content integrity of high-resolution remote sensing (HRRS) images is the premise of its usability. Existing HRRS image integrity authentication methods are mostly binary decision-making processes, which cannot provide a further interpretable information ... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Kaimeng Ding, Yueming Liu, Qin Xu and Fuqiang Lu    
Data security technology is of great significance to the application of high resolution remote sensing image (HRRS) images. As an important data security technology, perceptual hash overcomes the shortcomings of cryptographic hashing that is not robust a... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Kaimeng Ding, Fan Meng, Yueming Liu, Nan Xu and Wenjun Chen    
High resolution remote sensing (HRRS) images are widely used in many sensitive fields, and their security should be protected thoroughly. Integrity authentication is one of their major security problems, while the traditional techniques cannot fully meet... ver más
Revista: Information    Formato: Electrónico

 
en línea
Kaimeng Ding, Fan Meng, Yueming Liu, Nan Xu and Wenjun Chen    
-
Revista: Information    Formato: Electrónico

 
en línea
Kamaladevi B., Vanithamani M.R.     Pág. 12 - 16
E-customers love to do online shopping, but free from risk and danger over the internet ie., protection of information & system resources with respect to confidentiality, integrity and authentication. The confidentiality ensures that the nonaccess of inf... ver más

 
en línea
Franklin Tchakounté, Athanase Esdras Yera Pagor, Jean Claude Kamgang and Marcellin Atemkeng    
To keep its business reliable, Google is concerned to ensure the quality of apps on the store. One crucial aspect concerning quality is security. Security is achieved through Google Play protect and anti-malware solutions. However, they are not totally e... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Giriraj Sharma, Amit M. Joshi and Saraju P. Mohanty    
This paper presents a hardware-assisted security primitive that integrates the Trusted Platform Module (TPM) into IoT devices for authentication in smart grids. Data and device security plays a pivotal role in smart grids since they are vulnerable to var... ver más
Revista: Information    Formato: Electrónico

 
en línea
Anish Saini, Athanasios Tsokanos and Raimund Kirner    
Cryptography is the study and practice of secure communication with digital data and focuses on confidentiality, integrity, and authentication. Random number generators (RNGs) generate random numbers to enhance security. Even though the cryptographic alg... ver más
Revista: Information    Formato: Electrónico

 
en línea
Karam Eddine Bilami and Pascal LORENZ    
Security is a challenging issue for M2M/IoT applications due to the deployment, decentralization and heterogeneity of M2M and IoT devices. Typical security solutions may not be suitable for M2M/IoT systems regarding the difficulties encountered for their... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Athanasios Goudosis and Sokratis Katsikas    
The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents. Unfortunately, people involved in such i... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Rafael Páez, Manuel Pérez, Gustavo Ramírez, Juan Montes and Lucas Bouvarel    
This paper proposes an architecture for biometric electronic identification document (e-ID) system based on Blockchain for citizens identity verification in transactions corresponding to the notary, registration, tax declaration and payment, basic health... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Anuj Kumar Singh, Arun Solanki, Anand Nayyar and Basit Qureshi    
In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Alexander Grusho,Alexander Zatsarinny,Elena Timonina     Pág. 46 - 50
It is considered in the article the implementation issues of one of the digital economy basic directions related to information security concerning the protection of information in distributed ledgers. Any information system has to be constructed on the ... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Nikos Fotiou and George C. Polyzos    
Information-Centric Networking (ICN) is an emerging communication paradigm built around content names. Securing ICN using named-based security is, therefore, a natural choice. For this paper, we designed and evaluated name-based security solutions that s... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Zhengmao Ye, Hang Yin and Yongmao Ye    
This article presents an advanced dual chaotic watermarking scheme to improve information security. To ensure confidentiality in digital image transmission, a secure dual watermarking scheme is proposed by applying the chaotic logistic system and hyper-c... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Erick Paulus, Mochamad Azmi Fauzan     Pág. 1 - 11
The technology development allows people to more easily communicate and convey information. The current communication media can facilitate its users to send and receive digital data, such as text, sound or digital image. But in terms of security, communi... ver más

 
en línea
Marco Calabretta,Riccardo Pecori,Massimo Vecchio,Luca Veltri     Pág. 320 - 331
Security in the Internet of Things is a current hot topic and it may comprise different aspects such as confidentiality and integrity of personal data, as well as the authentication and the authorization to access smart objects that are spreading more an... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Xiaoyan Yu, Chengyou Wang and Xiao Zhou    
With the popularity of network and the continuous development of multimedia technology, saving of network bandwidth and copyright protection of multimedia content have gradually attracted people?s attention. The fragile watermark for integrity authentica... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »