Search
Search Results
-
Compact Structure-Preserving Signatures with Almost Tight Security
In structure-preserving cryptography, every building block shares the same bilinear groups. These groups must be generated for a specific, a priori...
-
Security to text (S2T): multi-layered based security approaches for secret text content
In the digital world, text data is produced in an unstructured manner across various communication channels. Extracting valuable information from...
-
An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems
The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity,...
-
Multiple security policies for classified data items in replicated DRTDBS
Dealing with security requirements in fixed budgets and strict time limits is becoming increasingly complex, time-consuming, and resource-intensive....
-
Ontology-based security modeling in ArchiMate
Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the...
-
On the security of functional encryption in the generic group model
In the context of functional encryption (FE), a weak security notion called selective security , which enforces the adversary to complete a challenge...
-
A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture
Information security data breaches are becoming larger and more frequent. Incorporating information security into the culture of the information...
-
Speech emotion recognition systems and their security aspects
Speech emotion recognition (SER) systems leverage information derived from sound waves produced by humans to identify the concealed emotions in...
-
Rest security framework for event streaming bus architecture
Businesses are confronted with a massive influx of real-time data originating from various sources such as application logs, website clickstreams,...
-
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
We construct an identity-based encryption (IBE) scheme that is tightly secure in a very strong sense. Specifically, we consider a setting with many...
-
A Model-Based Systems Engineering Plugin for Cloud Security Architecture Design
Security is one of the biggest concerns for cloud infrastructures. Cloud infrastructures are susceptible to a wide range of threats, including...
-
Enhancement of a Company-Wide Information Security Management System Through Incident Learning
We propose the Delta ISMS method that strengthens the company-wide information security management system (ISMS) through incident learning....
-
Security-Aware Database Migration Planning
Database migration is an important problem faced by companies dealing with big data. Not only is migration a costly procedure, but it also involves...
-
4MIDable: Flexible Network Offloading For Security VNFs
The ever-growing volume of network traffic and widening adoption of Internet protocols to underpin common communication processes augments the...
-
Improving security performance of Internet of Medical Things using hybrid metaheuristic model
The security of the Internet of Medical Things (IoMT) is very important because it connects many medical devices to improve care operations and...
-
Research trends in deep learning and machine learning for cloud computing security
Deep learning and machine learning show effectiveness in identifying and addressing cloud security threats. Despite the large number of articles...
-
Heterogeneous IoT (HetIoT) security: techniques, challenges and open issues
The HetIoT is a new emergent technology widely used to offer QoS to applications such as health monitoring systems, agriculture 4.0, traffic...
-
A quantitative analysis of the security of PoW-based blockchains
This study analyzes the security implications of Proof-of-Work blockchains with respect to the stale block rate and the lack of a block verification...
-
Post-quantum security design for hierarchical healthcare systems based on lattices
The need for high-quality healthcare services increases to more incredible speeds. Smart healthcare offers an ecosystem of IoT wireless networks,...
-
Security requirements specification by formal methods: a research metadata analysis
In recent years, the field of security requirements specification by formal methods has changed radically. The security requirement specification is...