Multiple-layer image encryption utilizing fractional-order chen hyperchaotic map and cryptographically secure prngs

W Alexan, N Alexan, M Gabr - Fractal and Fractional, 2023 - mdpi.com
Image encryption is increasingly becoming an important area of research in information
security and network communications as digital images are widely used in various …

Prochlo: Strong privacy for analytics in the crowd

A Bittau, Ú Erlingsson, P Maniatis, I Mironov… - Proceedings of the 26th …, 2017 - dl.acm.org
The large-scale monitoring of computer users' software activities has become commonplace,
eg, for application telemetry, error reporting, or demographic profiling. This paper describes …

{ZMap}: Fast internet-wide scanning and its security applications

Z Durumeric, E Wustrow, JA Halderman - 22nd USENIX Security …, 2013 - usenix.org
Internet-wide network scanning has numerous security applications, including exposing new
vulnerabilities and tracking the adoption of defensive mechanisms, but probing the entire …

Comparing the usability of cryptographic apis

Y Acar, M Backes, S Fahl, S Garfinkel… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Potentially dangerous cryptography errors are well-documented in many applications.
Conventional wisdom suggests that many of these errors are caused by cryptographic …

Analysis of the HTTPS certificate ecosystem

Z Durumeric, J Kasten, M Bailey… - Proceedings of the 2013 …, 2013 - dl.acm.org
We report the results of a large-scale measurement study of the HTTPS certificate ecosystem-
--the public-key infrastructure that underlies nearly all secure web communications. Using …

SOAP processing performance and enhancement

JM Tekli, E Damiani, R Chbeir… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
The web services (WS) technology provides a comprehensive solution for representing,
discovering, and invoking services in a wide variety of environments, including Service …

[图书][B] Real 802.11 security: Wi-Fi protected access and 802.11 i

J Edney, WA Arbaugh - 2004 - books.google.com
Annotation & bull; & bull; Describes new approach to wireless security based on Wi-Fi
Protected Access (WPA) and the 802.11 i standard (releasing summer 2003). & bull; …

Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security

D Grzonka, A Jakóbik, J Kołodziej, S Pllana - Future generation computer …, 2018 - Elsevier
Cloud Computing is one of the most intensively developed solutions for large-scale
distributed processing. Effective use of such environments, management of their high …

Cache-timing template attacks

BB Brumley, RM Hakala - Advances in Cryptology–ASIACRYPT 2009: 15th …, 2009 - Springer
Cache-timing attacks are a serious threat to security-critical software. We show that the
combination of vector quantization and hidden Markov model cryptanalysis is a powerful tool …

[PDF][PDF] Sans institute infosec reading room

RF Rights - Risk, 2001 - picture.iczhiku.com
As Technology pushes the limits of removable media-so drives the need for a new file
system in order to support the larger capacities and faster access speeds being designed …