Digital forensic investigation framework for the metaverse

S Seo, B Seok, C Lee - The Journal of Supercomputing, 2023 - Springer
The Metaverse is currently becoming a massive technology platform and is considered to be
the next significant development in global technology and business landscapes. The …

A novel lightweight block encryption algorithm based on combined chaotic system

D Zhu, X Tong, Z Wang, M Zhang - Journal of Information Security and …, 2022 - Elsevier
Due to the high complexity of traditional block cipher, which is not suitable for resource
constrained devices such as wireless sensors. Therefore, this paper proposes a novel …

[PDF][PDF] Quality Assurance in Digital Forensic Investigations: Optimal Strategies and Emerging Innovations

A Iftikhar, R Farooq, M Mumtaz, S Hussain… - Austin J Forensic Sci …, 2023 - researchgate.net
Digital forensic investigations are critical in modern law enforcement, cybersecurity, and
legal proceedings. Ensuring digital evidence's accuracy, integrity, and reliability is …

Geometric searchable encryption for privacy-preserving location-based services

Z Chen, J Nie, Z Li, W Susilo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Location data play an important role in location-based services (LBS) since they can help a
service provider analyze users' daily activities and further derive users' behavioral patterns …

COLM under attack: A cryptanalytic exploration of COLM variants

D Chakraborty, M Nandi - Journal of Information Security and Applications, 2025 - Elsevier
Abstract Authenticated Encryption with Associated Data (AEAD) schemes have become a
powerful solution for addressing contemporary security challenges. Within the recipients of …

Geometric searchable encryption without false positive and its applications

Z Chen, J Nie, Z Li, C Ge, W Susilo - The Computer Journal, 2023 - academic.oup.com
As a prominent cryptographic tool, geometric searchable encryption (GSE) can be applied in
many scenarios, such as location-based services (LBS), social networks and vehicle …

Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM

SE Ulusoy, O Kara, MÖ Efe - Journal of Information Security and …, 2022 - Elsevier
There are three main approaches related to cryptanalysis of Authenticated Encryption with
Associated Data (AEAD) algorithms: Simulating the encryption oracle (universal forgery …

Enhancing data security in cloud computing: a blockchain-based Feistel cipher encryption and multiclass vector side-channel attack detection approach

R Subbareddy, PT Selvan - International Journal of Advanced …, 2024 - search.proquest.com
Cloud computing (CC) environments offer cost-efficient and flexible resources, appealing to
users despite concerns about the reliability of cloud service providers (CSPs) and data …

Lightweight encryption techniques: Types, challenges and security issues

TCS Priya, R Sridevi, KSS Rao - Computational Methods in …, 2024 - taylorfrancis.com
Due to the deployment of Wireless Sensor Networks (WSN) in hostile environments, they are
prone to a different set of attacks. Securing the data that is being transmitted over the …

SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization

N Das, AP Panchanathan - IET Computers & Digital …, 2021 - Wiley Online Library
Recently, the finite state machine (FSM)‐based digital controllers are susceptible to fault‐
injection and side‐channel attacks, which makes FSM security a more prominent factor. FSM …