Cyber security: Current threats, challenges, and prevention methods
M Jain, A Sinha, A Agrawal… - … Conference on Advances …, 2022 - ieeexplore.ieee.org
Objective of this study is to perceive the attacks, threats, and weaknesses of digital
framework, which incorporate equipment and programming frameworks, organizations, and …
framework, which incorporate equipment and programming frameworks, organizations, and …
From an authentication question to a public social event: Characterizing birthday sharing on Twitter
Date of birth (DOB) has historically been considered as private information and safe to use
for authentication, but recent years have seen a shift towards wide public sharing. In this …
for authentication, but recent years have seen a shift towards wide public sharing. In this …
Immutable and secure IP address protection using blockchain
K Click, A Singh, RM Parizi, G Srivastava… - … Cybersecurity, Trust and …, 2020 - Springer
IP addresses can be passed on to new recipients even with a damaged reputation score. It
takes a lot of effort to defend a network against storing IP address data using current …
takes a lot of effort to defend a network against storing IP address data using current …
Persistent S/MIME signature in e-mails forwarding
C Dubos, A Serhrouchni - 2022 Seventh International …, 2022 - ieeexplore.ieee.org
The e-mail is nowadays one of the primary communication mean, that still lacks some simple
security possibilities. Among them, the electronic signature is a powerful technology, but it …
security possibilities. Among them, the electronic signature is a powerful technology, but it …
Analysing privacy in online social media
D Kekulluoglu - 2022 - era.ed.ac.uk
People share a wide variety of information on social media, including personal and sensitive
information, without understanding the size of their audience which may cause privacy …
information, without understanding the size of their audience which may cause privacy …
Modification of enigmail to use unique cryptographic algorithms in email
R Tani, Y Fukushima, Y Tarutani - IEIE Transactions on Smart …, 2021 - dbpia.co.kr
In this paper, we modify an email client so that it can use unique cryptographic algorithms
instead of general cryptographic algorithms for improved security. We use Thunderbird as …
instead of general cryptographic algorithms for improved security. We use Thunderbird as …
Seguridad, amenazas y mecanismos de protección de los dispositivos móviles
JG Moya - REVISTA MULTIDISCIPLINARIA DE …, 2024 - investigacion.utc.edu.ec
En la actualidad más de la mitad de los equipos de computación comerciales son móviles,
presentando estos dispositivos diversos y constantes desafíos para la seguridad de la red …
presentando estos dispositivos diversos y constantes desafíos para la seguridad de la red …
Classified enhancement model for big data storage reliability based on Boolean satisfiability problem
H Huang, L Khan, S Zhou - Cluster Computing, 2020 - Springer
Disk reliability is a serious problem in the big data foundation environment. Although the
reliability of disk drives has greatly improved over the past few years, they are still the most …
reliability of disk drives has greatly improved over the past few years, they are still the most …
Highly Classified with Two Factor Authentication Encrypted Secured Mail
NH Prasad, BNL Narayan… - Emerging Research in …, 2022 - Springer
Electronic mail which is used to send messages between Internet connected devices works
following simple mail transfer protocol (SMTP). The massages can contain text, images …
following simple mail transfer protocol (SMTP). The massages can contain text, images …
Assessing password practices of mobile apps
R Dudheria - International Journal of Computers and Applications, 2019 - Taylor & Francis
Mobile devices have become an essential part of human life and their increasing use has
given rise to a number of innovative applications (eg finance manager). As far as we know …
given rise to a number of innovative applications (eg finance manager). As far as we know …