System and method for data mining and security policy management

W Liu - US Patent 8,205,242, 2012 - Google Patents
US8205242B2 - System and method for data mining and security policy management -
Google Patents US8205242B2 - System and method for data mining and security policy …

Digital forensic readiness in the cloud

PM Trenwith, HS Venter - 2013 Information Security for South …, 2013 - ieeexplore.ieee.org
The traditional digital forensic investigation process has always had a post-event driven
focus. This process is perhaps too long for the cloud. This paper investigates how digital …

System and method for protecting specified data combinations

RPS Ahuja, WJ Deninger - US Patent 8,806,615, 2014 - Google Patents
(57) ABSTRACT A method in one example implementation includes extracting a plurality of
data elements from a record of a data file, tokenizing the data elements into tokens, and …

System architecture for high-performance permissioned blockchains

L Feng, H Zhang, WT Tsai, S Sun - Frontiers of Computer Science, 2019 - Springer
Blockchain (BC), as an emerging distributed database technology with advanced security
and reliability, has attracted much attention from experts who devoted to e-finance …

Lightweight security solutions for the internet of things

S Raza - 2013 - diva-portal.org
The future Internet will be an IPv6 network interconnecting traditional computers and a large
number of smart objects or networks such as Wireless Sensor Networks (WSNs). This …

Multicast security and its extension to a mobile environment

L Gong, N Shacham - Wireless Networks, 1995 - Springer
Multicast is rapidly becoming an important mode of communication and a good platform for
building group-oriented services. To be used for trusted communication, however, current …

Chemical unclonable functions based on operable random DNA pools

AM Luescher, AL Gimpel, WJ Stark, R Heckel… - Nature …, 2024 - nature.com
Physical unclonable functions (PUFs) based on unique tokens generated by random
manufacturing processes have been proposed as an alternative to mathematical one-way …

Fast hashing on the Pentium

A Bosselaers, R Govaerts, J Vandewalle - Advances in Cryptology …, 1996 - Springer
With the advent of the Pentium processor parallelization finally became available to Intel
based computer systems. One of the design principles of the MD4-family of hash functions …

Privacy-enhanced robust image hashing with bloom filters

U Breidenbach, M Steinebach, H Liu - Proceedings of the 15th …, 2020 - dl.acm.org
Robust image hashes are used to detect known illegal images, even after image processing.
This is, for example, interesting for a forensic investigation, or for a company to protect their …

Attributes of captured objects in a capture system

RPS Ahuja, W Deninger, E de la Iglesia… - US Patent …, 2011 - Google Patents
US7958227B2 - Attributes of captured objects in a capture system - Google Patents
US7958227B2 - Attributes of captured objects in a capture system - Google Patents Attributes of …