We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Compact Structure-Preserving Signatures with Almost Tight Security

    In structure-preserving cryptography, every building block shares the same bilinear groups. These groups must be generated for a specific, a priori...

    Masayuki Abe, Dennis Hofheinz, ... Jiaxin Pan in Journal of Cryptology
    Article Open access 10 August 2023
  2. Security to text (S2T): multi-layered based security approaches for secret text content

    In the digital world, text data is produced in an unstructured manner across various communication channels. Extracting valuable information from...

    Shamal Kashid, Lalit K. Awasthi, Krishan Berwal in Multimedia Tools and Applications
    Article 19 June 2024
  3. An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems

    The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity,...

    Shitharth Selvarajan, Gautam Srivastava, ... Jerry Chun-Wei Lin in Journal of Cloud Computing
    Article Open access 16 March 2023
  4. Multiple security policies for classified data items in replicated DRTDBS

    Dealing with security requirements in fixed budgets and strict time limits is becoming increasingly complex, time-consuming, and resource-intensive....

    Article 16 October 2023
  5. Ontology-based security modeling in ArchiMate

    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the...

    Ítalo Oliveira, Tiago Prince Sales, ... Giancarlo Guizzardi in Software and Systems Modeling
    Article Open access 16 February 2024
  6. On the security of functional encryption in the generic group model

    In the context of functional encryption (FE), a weak security notion called selective security , which enforces the adversary to complete a challenge...

    Hyung Tae Lee, Jae Hong Seo in Designs, Codes and Cryptography
    Article 27 May 2023
  7. A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture

    Information security data breaches are becoming larger and more frequent. Incorporating information security into the culture of the information...

    S.G. Govender, E. Kritzinger, M. Loock in Personal and Ubiquitous Computing
    Article 18 March 2021
  8. Speech emotion recognition systems and their security aspects

    Speech emotion recognition (SER) systems leverage information derived from sound waves produced by humans to identify the concealed emotions in...

    Itzik Gurowiec, Nir Nissim in Artificial Intelligence Review
    Article Open access 21 May 2024
  9. Rest security framework for event streaming bus architecture

    Businesses are confronted with a massive influx of real-time data originating from various sources such as application logs, website clickstreams,...

    Jaimandeep Singh, Naveen Kumar Chaudhary in International Journal of Information Technology
    Article 13 April 2024
  10. Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting

    We construct an identity-based encryption (IBE) scheme that is tightly secure in a very strong sense. Specifically, we consider a setting with many...

    Dennis Hofheinz, Jessica Koch, Christoph Striecks in Journal of Cryptology
    Article Open access 29 February 2024
  11. A Model-Based Systems Engineering Plugin for Cloud Security Architecture Design

    Security is one of the biggest concerns for cloud infrastructures. Cloud infrastructures are susceptible to a wide range of threats, including...

    Yuri Gil Dantas, Vivek Nigam, Ulrich Schöpp in SN Computer Science
    Article 16 May 2024
  12. Enhancement of a Company-Wide Information Security Management System Through Incident Learning

    We propose the Delta ISMS method that strengthens the company-wide information security management system (ISMS) through incident learning....

    Hiroshi Horikawa, Hisamichi Ohtani, ... Masakatsu Nishigaki in SN Computer Science
    Article 17 February 2023
  13. Security-Aware Database Migration Planning

    Database migration is an important problem faced by companies dealing with big data. Not only is migration a costly procedure, but it also involves...

    Utku Umur Acikalin, Bugra Caskurlu, K. Subramani in Constraints
    Article 10 August 2023
  14. 4MIDable: Flexible Network Offloading For Security VNFs

    The ever-growing volume of network traffic and widening adoption of Internet protocols to underpin common communication processes augments the...

    Benjamin Lewis, Matthew Broadbent, ... Nicholas Race in Journal of Network and Systems Management
    Article Open access 15 June 2023
  15. Improving security performance of Internet of Medical Things using hybrid metaheuristic model

    The security of the Internet of Medical Things (IoMT) is very important because it connects many medical devices to improve care operations and...

    Ashok Kanneboina, Gopikrishnan Sundaram in Multimedia Tools and Applications
    Article 18 April 2024
  16. Research trends in deep learning and machine learning for cloud computing security

    Deep learning and machine learning show effectiveness in identifying and addressing cloud security threats. Despite the large number of articles...

    Yehia Ibrahim Alzoubi, Alok Mishra, Ahmet Ercan Topcu in Artificial Intelligence Review
    Article Open access 02 May 2024
  17. Heterogeneous IoT (HetIoT) security: techniques, challenges and open issues

    The HetIoT is a new emergent technology widely used to offer QoS to applications such as health monitoring systems, agriculture 4.0, traffic...

    Shalaka S. Mahadik, Pranav M. Pawar, Raja Muthalagu in Multimedia Tools and Applications
    Article 29 September 2023
  18. A quantitative analysis of the security of PoW-based blockchains

    This study analyzes the security implications of Proof-of-Work blockchains with respect to the stale block rate and the lack of a block verification...

    Maher Alharby, Ali Alssaiari, ... Aad van Moorsel in Cluster Computing
    Article Open access 14 July 2024
  19. Post-quantum security design for hierarchical healthcare systems based on lattices

    The need for high-quality healthcare services increases to more incredible speeds. Smart healthcare offers an ecosystem of IoT wireless networks,...

    Manel Boujelben, Mohamed Abid in The Journal of Supercomputing
    Article 25 April 2024
  20. Security requirements specification by formal methods: a research metadata analysis

    In recent years, the field of security requirements specification by formal methods has changed radically. The security requirement specification is...

    Aditya Dev Mishra, Khurram Mustafa in Multimedia Tools and Applications
    Article 13 October 2023
Did you find what you were looking for? Share feedback.