Cyber security: Current threats, challenges, and prevention methods

M Jain, A Sinha, A Agrawal… - … Conference on Advances …, 2022 - ieeexplore.ieee.org
Objective of this study is to perceive the attacks, threats, and weaknesses of digital
framework, which incorporate equipment and programming frameworks, organizations, and …

From an authentication question to a public social event: Characterizing birthday sharing on Twitter

D Keküllüoğlu, W Magdy, K Vaniea - Proceedings of the International …, 2022 - ojs.aaai.org
Date of birth (DOB) has historically been considered as private information and safe to use
for authentication, but recent years have seen a shift towards wide public sharing. In this …

Immutable and secure IP address protection using blockchain

K Click, A Singh, RM Parizi, G Srivastava… - … Cybersecurity, Trust and …, 2020 - Springer
IP addresses can be passed on to new recipients even with a damaged reputation score. It
takes a lot of effort to defend a network against storing IP address data using current …

Persistent S/MIME signature in e-mails forwarding

C Dubos, A Serhrouchni - 2022 Seventh International …, 2022 - ieeexplore.ieee.org
The e-mail is nowadays one of the primary communication mean, that still lacks some simple
security possibilities. Among them, the electronic signature is a powerful technology, but it …

Analysing privacy in online social media

D Kekulluoglu - 2022 - era.ed.ac.uk
People share a wide variety of information on social media, including personal and sensitive
information, without understanding the size of their audience which may cause privacy …

Modification of enigmail to use unique cryptographic algorithms in email

R Tani, Y Fukushima, Y Tarutani - IEIE Transactions on Smart …, 2021 - dbpia.co.kr
In this paper, we modify an email client so that it can use unique cryptographic algorithms
instead of general cryptographic algorithms for improved security. We use Thunderbird as …

Seguridad, amenazas y mecanismos de protección de los dispositivos móviles

JG Moya - REVISTA MULTIDISCIPLINARIA DE …, 2024 - investigacion.utc.edu.ec
En la actualidad más de la mitad de los equipos de computación comerciales son móviles,
presentando estos dispositivos diversos y constantes desafíos para la seguridad de la red …

Classified enhancement model for big data storage reliability based on Boolean satisfiability problem

H Huang, L Khan, S Zhou - Cluster Computing, 2020 - Springer
Disk reliability is a serious problem in the big data foundation environment. Although the
reliability of disk drives has greatly improved over the past few years, they are still the most …

Highly Classified with Two Factor Authentication Encrypted Secured Mail

NH Prasad, BNL Narayan… - Emerging Research in …, 2022 - Springer
Electronic mail which is used to send messages between Internet connected devices works
following simple mail transfer protocol (SMTP). The massages can contain text, images …

Assessing password practices of mobile apps

R Dudheria - International Journal of Computers and Applications, 2019 - Taylor & Francis
Mobile devices have become an essential part of human life and their increasing use has
given rise to a number of innovative applications (eg finance manager). As far as we know …