The Metaverse and Digital Libraries: Ensuring Safe and Secure Access to Information
K Sinha - Handbook of Research on Advancements of …, 2023 - igi-global.com
The metaverse, a virtual shared space, has the potential to revolutionize how we access and
use digital libraries. As the metaverse becomes more widely adopted, it is essential to …
use digital libraries. As the metaverse becomes more widely adopted, it is essential to …
The Nexus of War, Violence, and Rights: A History of War-Torn Afghanistan
Afghanistan is a land that is known for its war, violence, and instability. Called a rogue state,
Afghanistan has been living with violence and war as part of its reality for the last four …
Afghanistan has been living with violence and war as part of its reality for the last four …
Right to Correct Information in the Cyber World
Every human life has interacted with technology and data in the information age. The big
tech companies and institutions spend millions of dollars to extract information about human …
tech companies and institutions spend millions of dollars to extract information about human …
Detection Of Insider Attacks In Block Chain Network Using The Trusted Two Way Intrusion Detection System
DN Kirupanithi, A Antonidoss, G Subathra - arXiv preprint arXiv …, 2022 - arxiv.org
For data privacy, system reliability, and security, Blockchain technologies have become
more popular in recent years. Despite its usefulness, the blockchain is vulnerable to cyber …
more popular in recent years. Despite its usefulness, the blockchain is vulnerable to cyber …
An Efficient Approach for Sending Identification Bit With the Help of Blowfish-RC6
K Patidar, DP Tiwari, P Sharma… - … of Research on …, 2023 - igi-global.com
This chapter used an efficient mechanism based on blowfish and the RC6 (BRC6) algorithm
for better security against cross-site scripting (XSS) attacks. The data types covered in this …
for better security against cross-site scripting (XSS) attacks. The data types covered in this …
[PDF][PDF] DETECTION OF INSIDER ATTACKS IN BLOCK CHAIN NETWORK USING THE TRUSTED TWO WAY INTRUSION DETECTION SYSTEM
D NancyKirupanithi, A Antonidoss, G Subathra - academia.edu
For data privacy, system reliability, and security, Blockchain technologies have become
more popular in recent years. Despite its usefulness, the blockchain is vulnerable to cyber …
more popular in recent years. Despite its usefulness, the blockchain is vulnerable to cyber …