Digital video tampering detection and localization: Review, representations, challenges and algorithm
Digital videos are now low-cost, easy to capture and easy to share on social media due to
the common feature of video recording in smart phones and digital devices. However, with …
the common feature of video recording in smart phones and digital devices. However, with …
Real time MODBUS transmissions and cryptography security designs and enhancements of protocol sensitive information
Information technology (IT) security has become a major concern due to the growing
demand for information and massive development of client/server applications for various …
demand for information and massive development of client/server applications for various …
A comprehensive analysis of digital video forensics techniques and challenges
The massive dependence on digital interaction via multimedia tools like audio, images, and
videos is leading to an era that will be digitized in almost every aspect. This credible …
videos is leading to an era that will be digitized in almost every aspect. This credible …
Anomaly detection for simulated iec-60870-5-104 trafiic
E Hodo, S Grebeniuk, H Ruotsalainen… - Proceedings of the 12th …, 2017 - dl.acm.org
Substation security plays an important role in the delivery system of electrical energy. During
the past years, there has been an increase in the number of attacks on automation systems …
the past years, there has been an increase in the number of attacks on automation systems …
Hamming code based watermarking scheme for 3D model verification
JT Wang, YC Chang, CY Yu… - Mathematical Problems in …, 2014 - Wiley Online Library
Due to the explosive growth of the Internet and maturing of 3D hardware techniques,
protecting 3D objects becomes a more and more important issue. In this paper, a public …
protecting 3D objects becomes a more and more important issue. In this paper, a public …
Digital document signing: Vulnerabilities and solutions
G Lax, F Buccafurri, G Caminiti - Information Security Journal: A …, 2015 - Taylor & Francis
Digital signature is the key issue in a number of innovative processes, such as
dematerialization, e-government, e-commerce, and e-banking. Digital signature ensures …
dematerialization, e-government, e-commerce, and e-banking. Digital signature ensures …
Netvote: a strict-coercion resistance re-voting based internet voting scheme with linear filtering
I Querejeta-Azurmendi, D Arroyo Guardeño… - Mathematics, 2020 - mdpi.com
This paper proposes NetVote, an internet voting protocol where usability and ease in
deployment are a priority. We introduce the notion of strict coercion resistance, to distinguish …
deployment are a priority. We introduce the notion of strict coercion resistance, to distinguish …
Presence of dynamics of quantum dots in the digital signature using DNA alphabet and chaotic S-box
The integrity and authenticity of the message, and it's nonrepudiation, are provided by digital
signatures. We introduce quantum digital signature schemes based on Quantum Dots …
signatures. We introduce quantum digital signature schemes based on Quantum Dots …
Bringing JSON signatures to ETSI AdES framework: Meet JAdES signatures
JCC Ibarz - Computer Standards & Interfaces, 2020 - Elsevier
This paper proposes a set of JSON signed and unsigned attributes which, if incorporated
into a JSON signature, will convert it in a digital signature (JAdES) with identical capabilities …
into a JSON signature, will convert it in a digital signature (JAdES) with identical capabilities …
Privacy preserving file auditing schemes for cloud storage using verifiable random function
Users leverage the cloud storage to store data by uploading files to the cloud storage. They
can use it to share files to work on collaborative projects. However, during administrative …
can use it to share files to work on collaborative projects. However, during administrative …