A systematic review on blockchain-based access control systems in cloud environment
The widespread adoption of cloud computing has dramatically altered how data is stored,
processed, and accessed in an era. The rapid development of digital technologies …
processed, and accessed in an era. The rapid development of digital technologies …
Ensuring accountability in digital forensics with proxy re-encryption based chain of custody
In the realm of digital forensics, the establishment of robust standards for maintaining the
integrity of digital evidence is of paramount importance. Addressing this concern, this study …
integrity of digital evidence is of paramount importance. Addressing this concern, this study …
A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence
The effective management of digital evidence is critical to modern forensic investigations.
However, traditional evidence management approaches are often prone to security and …
However, traditional evidence management approaches are often prone to security and …
Proactive cyber defense through a comprehensive forensic layer for cybercrime attribution
The extension of digital competences in the ever-changing world of technology has
transported global organizations new opportunities like never before. But this expansion has …
transported global organizations new opportunities like never before. But this expansion has …
[PDF][PDF] Anonymity in decentralized apps: Study of implications for cybercrime investigations
In the digital age, cybercrime facilitated by anonymous communication apps raises
significant concerns. Criminals exploit the anonymity provided by these apps, creating …
significant concerns. Criminals exploit the anonymity provided by these apps, creating …
Cybercrime investigation model
A Chechulin, M Gorda - 2024 16th International Conference on …, 2024 - ieeexplore.ieee.org
The rise of cybercrime is a daily challenge for individuals, organizations, and governments,
especially when resources are scarce and cyberattacks are becoming more complex. These …
especially when resources are scarce and cyberattacks are becoming more complex. These …
Performance analysis of extracting object structure from source code
R Wojszczyk, A Hapka, T Królikowski - Procedia Computer Science, 2023 - Elsevier
Tools for programmers are constantly evolving, and with that evolution comes tools that
support their work, such as those that enable testing and analysis of program code. It is …
support their work, such as those that enable testing and analysis of program code. It is …
On the Application of Privacy Computing in the Field of National Cyberspace Security
Y Zhou, J Ye, Z Zhang - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Privacy computing technology means the collection of technologies that realize data
analysis and calculation under the premise of protecting the data itself from external …
analysis and calculation under the premise of protecting the data itself from external …
An Auditable Framework for Evidence Sharing and Management Using Smart Lockers and Distributed Technologies: Law Enforcement Use Case
This paper presents a decentralised framework for sharing and managing evidence that
uses smart lockers, blockchain technology, and the InterPlanetary File System (IPFS). The …
uses smart lockers, blockchain technology, and the InterPlanetary File System (IPFS). The …
An Approach for Securing IoT Data using Blockchain and Proxy Re-Encryption
M Saradha, B Keerthivasan… - 2024 International …, 2024 - ieeexplore.ieee.org
The development of Internet of Things (IoT) devices has resulted in exponential data
generation, creating substantial problems to guaranteeing the security and privacy of …
generation, creating substantial problems to guaranteeing the security and privacy of …