Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 04 Oct 2024Bibliometrics
Skip Table Of Content Section
research-article
Integrating information quality dimensions into information security risk management (ISRM)

This research strives to serve as a fundamental stepping stone for triggering the attention of researchers and information security practitioners on the needs of integrating information quality dimension in the ISRM field.This research contributes to ...

research-article
Policy Management Engine (PME)

One of the most challenging issues regarding to the information policy concerns in cloud computing environments is to provide an appropriate level of security for the stored data in cloud storages. In fact, each individual cloud customer needs to be ...

research-article
Analysis of hierarchical identity based encryption schemes and its applicability to computing environments

Hierarchical Identity Based Encryption (HIBE) enhances the scalability of Identity based encryption scheme, by sharing the workload of the root Private Key Generator (PKG) among multiple lower-level PKGs, facilitating intermediate key escrows and ...

research-article
Deriving and measuring DNS-based fingerprints

In this paper, we study a new privacy risk, namely DNS-based Fingerprints, introduced by passively collected DNS traffic. We intend to derive behavioral fingerprints from DNS traces, where each behavioral fingerprint targets at uniquely identifying its ...

research-article
Design of a proficient hybrid protocol for efficient route discovery and secure data transmission in CEAACK MANETs

Clustering can be made effective in CEAACK MANETs by opting for a cluster head mechanism which ensures that control rests with a single powerful node within a cluster. This cluster head takes on the responsibility of routing the packets efficiently by ...

research-article
Security bound enhancement of remote user authentication using smart card

Distribution of resources and services via open network has becoming latest trend in information technology. This is provided by many service provider servers. In open network, hackers can easily obtain the communication data. Therefore, open networks ...

research-article
A practical, secure, and auditable e-voting system

A cryptographic electronic voting system is proposed, to replace the conventional voting methods, which are widely used in most developing countries in the Middle East and North Africa (MENA) region. The proposed e-voting system is based on the concept ...

research-article
Cyber security attacks to modern vehicular systems

Security is a fundamental concern in modern vehicular systems. The advancement in modern vehicular systems provides many benefits such as reducing traffic congestion and improving safety and fuel economy via vehicular networks. However, many vehicular ...

research-article
Privacy in elections

We study the impact on privacy in results reporting in elections. In the interests of transparency election commissions report details of aggregated vote counts; in the interests of privacy some of that information must be suppressed. We apply recent ...

research-article
Randomized authentication primitive problem in key exchange with strong security

Security proofs are invaluable formal criteria in assuring practitioners on the security properties of protocols. However, one could obtain various security results while proving the considered protocol in different security models. We notice that there ...

research-article
Detection of image seam carving by using weber local descriptor and local binary patterns

Seam carving is a popular content-aware image resizing technique by removing unnoticeable seams with low energies for aesthetic purpose. However, it might also be used for malicious forgeries such as object removal. In this paper, a blind forensics ...

research-article
MLP-GA based algorithm to detect application layer DDoS attack

Distributed Denial of Service (DDoS) attack is transforming into a weapon by the attackers, politicians, and cyber terrorists, etc. Today there is a quick ascent in the exploration field of mitigation and guard against DDoS attacks, however in actuality;...

Comments