Digital forensic investigation framework for the metaverse
The Metaverse is currently becoming a massive technology platform and is considered to be
the next significant development in global technology and business landscapes. The …
the next significant development in global technology and business landscapes. The …
A novel lightweight block encryption algorithm based on combined chaotic system
D Zhu, X Tong, Z Wang, M Zhang - Journal of Information Security and …, 2022 - Elsevier
Due to the high complexity of traditional block cipher, which is not suitable for resource
constrained devices such as wireless sensors. Therefore, this paper proposes a novel …
constrained devices such as wireless sensors. Therefore, this paper proposes a novel …
[PDF][PDF] Quality Assurance in Digital Forensic Investigations: Optimal Strategies and Emerging Innovations
A Iftikhar, R Farooq, M Mumtaz, S Hussain… - Austin J Forensic Sci …, 2023 - researchgate.net
Digital forensic investigations are critical in modern law enforcement, cybersecurity, and
legal proceedings. Ensuring digital evidence's accuracy, integrity, and reliability is …
legal proceedings. Ensuring digital evidence's accuracy, integrity, and reliability is …
Geometric searchable encryption for privacy-preserving location-based services
Z Chen, J Nie, Z Li, W Susilo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Location data play an important role in location-based services (LBS) since they can help a
service provider analyze users' daily activities and further derive users' behavioral patterns …
service provider analyze users' daily activities and further derive users' behavioral patterns …
COLM under attack: A cryptanalytic exploration of COLM variants
D Chakraborty, M Nandi - Journal of Information Security and Applications, 2025 - Elsevier
Abstract Authenticated Encryption with Associated Data (AEAD) schemes have become a
powerful solution for addressing contemporary security challenges. Within the recipients of …
powerful solution for addressing contemporary security challenges. Within the recipients of …
Geometric searchable encryption without false positive and its applications
As a prominent cryptographic tool, geometric searchable encryption (GSE) can be applied in
many scenarios, such as location-based services (LBS), social networks and vehicle …
many scenarios, such as location-based services (LBS), social networks and vehicle …
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM
There are three main approaches related to cryptanalysis of Authenticated Encryption with
Associated Data (AEAD) algorithms: Simulating the encryption oracle (universal forgery …
Associated Data (AEAD) algorithms: Simulating the encryption oracle (universal forgery …
Enhancing data security in cloud computing: a blockchain-based Feistel cipher encryption and multiclass vector side-channel attack detection approach
R Subbareddy, PT Selvan - International Journal of Advanced …, 2024 - search.proquest.com
Cloud computing (CC) environments offer cost-efficient and flexible resources, appealing to
users despite concerns about the reliability of cloud service providers (CSPs) and data …
users despite concerns about the reliability of cloud service providers (CSPs) and data …
Lightweight encryption techniques: Types, challenges and security issues
Due to the deployment of Wireless Sensor Networks (WSN) in hostile environments, they are
prone to a different set of attacks. Securing the data that is being transmitted over the …
prone to a different set of attacks. Securing the data that is being transmitted over the …
SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization
N Das, AP Panchanathan - IET Computers & Digital …, 2021 - Wiley Online Library
Recently, the finite state machine (FSM)‐based digital controllers are susceptible to fault‐
injection and side‐channel attacks, which makes FSM security a more prominent factor. FSM …
injection and side‐channel attacks, which makes FSM security a more prominent factor. FSM …