1,831 Hits in 2.7 sec

Blockchain Technology and Electronic Wills

Aniela-Flavia Ţicău-Suditu
2021 Analele Ştiinţifice ale Universităţii "Al.I. Cuza" din Iaşi. Ştiinţe Juridice  
These formalities are followed by another one, that concerns the actual manner of communication, enabling the testator and witnesses, or, when needed, public notaries, to be connected through audio-visual  ...  Our assessment on Blockchain wills convinced us that they would be more secure, easier to conclude and would display a higher rate of validity in contrast with the traditional, paper wills.  ... 
doi:10.47743/jss-2021-67-4-8 fatcat:ze3dbhko5fecvioqdyhosewvee

Reconfiguring Crypto Hardware Accelerators on Wireless Sensor Nodes

Steffen Peter, Oliver Stecklina, Jorge Portilla, Eduardo de la Torre, Peter Langendoerfer, Teresa Riesgo
2009 2009 6th IEEE Annual Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Workshops  
The drawback of crypto ASICs is the loss of flexibility.  ...  The visualization will be done in the following way. Standard motes will be connected to the FPG. On the motes the algorithms will be executed in software.  ...  Visualizing security is extremely difficult. In the best case, i.e. all security features work fine nothing is to be seen.  ... 
doi:10.1109/sahcnw.2009.5172959 fatcat:gugmvv5lgfhyleminxa4w2hcka

Secure Mashup-Providing Platforms - Implementing Encrypted Wiring [chapter]

Matthias Herbert, Tobias Thieme, Jan Zibuschka, Heiko Roßnagel
2012 Lecture Notes in Computer Science  
The fact that mashups enable users to compose services to create a piece of software with new functionalities, integrating inputs from various sources, implies a security risk.  ...  In this paper we present a proof-of-concept implementation which enables the secure usage of a mashupproviding platform and protects sensitive data against malicious widgets and platform operators.  ...  On top are the widgets "Alice" and "Bob" and below is a test widget that visualizes the messages transmitted over the MPP is displayed. Fig. 3.  ... 
doi:10.1007/978-3-642-27997-3_9 fatcat:6of5max2jrd6jfrrclo5lucxzm


Maliheh Shirvanian, Nitesh Saxena
2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17  
Crypto Phones aim to establish end-to-end secure voice (and text) communications based on human-centric (usually) short checksum validation.  ...  security and usability.  ...  tasks ( Figure 1 visualizes the benign setting): • Checksum Comparison (required): Verbally communicating and matching checksums displayed on each user's device.  ... 
doi:10.1145/3133956.3134013 dblp:conf/ccs/ShirvanianS17 fatcat:tqe3u4k2xrbxtoieoplks33s7u

A survey on security of mobile handheld devices through elliptic curve cryptography

Ajithkumar V, K Satyanarayan Reddy
2016 ACCENTS Transactions on Information Security  
The beauty of asymmetric encryption, pair of key is generated at each communication end point, public key is shared and private key is retained.  ...  Security can be provided using strong encryption. There are various parameters which need to be considered such as power consumption, execution time, QOS.  ...  A PDA has an electronic visual display, enabling it to include a web browser, all current models also have audio capabilities enabling use as a portable media player, and also enabling most of them to  ... 
doi:10.19101/tis.2017.26001 fatcat:fvcu72siy5hw7iiw4pqj2z5cvi

Event Characteristics of Crypto Currency and Security

2019 International journal of recent technology and engineering  
In this paper, we have started to investigate the relationship between crypto currency and security incidents of block chain. This paper focuses on analysis of crypto currency event of block chain.  ...  We are focused on the relationship between the time of the security incident and the public awareness of the related crypto currency exchange.  ...  Therefore, it is necessary to efficiently collect information on social media about crypto currency and properly process it. The important thing is to enable keyword search.  ... 
doi:10.35940/ijrte.b1086.0982s1019 fatcat:xq53ebsaibd2zfqu5jtiuode3y

A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices

Iman Almomani, Aala Alkhayer, Walid El-Shafai
2022 Sensors  
This paper introduces a hybrid crypto-steganography approach for ransomware hiding within high-resolution video frames.  ...  Steganography is a vital security approach that hides any secret content within ordinary data, such as multimedia.  ...  In [30] , the authors developed a covert channel using the StegBlocks technique, which enables text communication between the active malware and its developer.  ... 
doi:10.3390/s22062281 pmid:35336452 pmcid:PMC8955722 fatcat:kye35ukuxvfunbxixhm7d453uq

Crypto art: A decentralized view [article]

Massimo Franceschet, Giovanni Colavizza, Tai Smith, Blake Finucane, Martin Lukas Ostachowski, Sergio Scalet, Jonathan Perkins, James Morgan, Sebastian Hernandez
2019 arXiv   pre-print
The ending section offers an attempt to pull all these threads together into a perspective on the future of crypto art.  ...  This is a decentralized position paper on crypto art, which includes viewpoints from different actors of the system: artists, collectors, galleries, art scholars, data scientists.  ...  Most platforms provide public conversation groups in chat applications like Telegram and Discord enabling the exchange and communication between crypto artists, art collectors, enthusiasts and the platform's  ... 
arXiv:1906.03263v1 fatcat:2uz4bti5krbkzilriitq62xssi

D7.2 - Project Website and Web 2.0 Channels

Institute Of Communication And Computer Systems
2019 Zenodo  
This is the accompanying documentation for the launch of the Website of the project and all needed Web 2.0 and social channels that will be used during the project for communication purposes.  ...  .  Secure Execution Layer: This layer will implement pluggable applications to support the security functionality of the ASCLEPIOS architecture.  Crypto Layer: The crypto layer will be implemented as  ...  The ASCLEPIOS architecture consists of five discrete layers: the cloud infrastructure layer, the crypto layer, the control layer, the data analytics layer and the secure execution layer.  ... 
doi:10.5281/zenodo.4022389 fatcat:p6hmqrf33nadvebskh5pwor754

MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors (Tool Insights Paper)

Linghui Luo, Julian Dolby, Eric Bodden, Michael Wagner
2019 European Conference on Object-Oriented Programming  
these two analyses illustrate the generality of MagpieBridge, as they are based on different program analysis frameworks -WALA and Soot respectively -for different application areas -machine learning and security  ...  Spyder), Web-based tools communicate using WebSockets (e.g. Jupyter and Monaco) and only few tools support both standard I/O and socket (e.g. Visual Studio Code).  ...  In this paper, we present the MagpieBridge workflow, explaining the common APIs we defined for enabling integration.  ... 
doi:10.4230/lipics.ecoop.2019.21 dblp:conf/ecoop/LuoDB19 fatcat:pcb2qr2z6fhuvgy5a72hvmy2f4

Page 4253 of Psychological Abstracts Vol. 91, Issue 11 [page]

2004 Psychological Abstracts  
Tex- tual display design can follow several directions that reflect a tradeoff be- tween a visual load and an operational load.  ...  —Security protocols play an important role 5  ... 

Using audio in secure device pairing

Michael T. Goodrich, Michael Sirivianos, John Solis, Claudio Soriente, Gene Tsudik, Ersin Uzun
2009 International Journal of Security and Networks (IJSN)  
Secure pairing of electronic devices is an important issue that must be addressed in many contexts.  ...  In the absence of prior security context, the need to involve the user in the pairing process is a prominent challenge.  ...  We note that audio also enables visually impaired users to interact with devices.  ... 
doi:10.1504/ijsn.2009.023426 fatcat:tx22bc6e6vevfkpbxojd6mcrdm


Dennis Felsch, Christian Mainka, Vladislav Mladenov, Jörg Schwenk
2017 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17  
We present SECRET, the first secure, efficient, and collaborative real-time editor.  ...  The connection of SECRET's crypto module to the keyserver requires a secure channel.  ...  It uses our SECRET crypto module as cryptographic oracle. The communication between the crypto module and the XMLSec library is done via the PostMessage API.  ... 
doi:10.1145/3052973.3052982 dblp:conf/ccs/FelschMMS17 fatcat:pxyyl6bf3rbjrlcl2fh53f52bq

Design of Secure Electronic Voting System Using Fingerprint Biometrics and CryptoWatermarking Approach

Olayemi M. Olaniyi, Taliha A. Folorunso, Aliyu Ahmed, Olugbenga Joseph
2016 International Journal of Information Engineering and Electronic Business  
Standard based Wavelet based Crypto-watermarking Approach.  ...  In this paper, we present the design and development of secure e-voting to ensure a free, fair and credible election where the preference of electorate counts.  ...  The interfacing of the system was enabled using a serial USB cable to communicate from the Computer system to the authentication module and vice versa. B.  ... 
doi:10.5815/ijieeb.2016.05.02 fatcat:5ihyn3gpqvgnpds43lkjecoyju

Security for the Industrial IoT: The Case for Information-Centric Networking [article]

Michael Frey, Cenk Gündoğan, Peter Kietzmann, Martine Lenders, Hauke Petersen, Thomas C. Schmidt, Felix Shzu-Juraschek, Matthias Wählisch
2019 arXiv   pre-print
Evaluation of the crypto efforts on the RIOT operating system for content security reveal its feasibility for common deployment scenarios.  ...  Industrial production plants traditionally include sensors for monitoring or documenting processes, and actuators for enabling corrective actions in cases of misconfigurations, failures, or dangerous events  ...  To enable M2M communication, CoAP implementations usually provide both client and server capabilities.  ... 
arXiv:1810.04645v2 fatcat:weaw3bp3qvdf5ndf6fmxerce5a
« Previous Showing results 1 — 15 out of 1,831 results