[PDF][PDF] A survey of security attacks, defenses and security mechanisms in wireless sensor network

S Biswas, S Adhikari - International Journal of Computer Applications, 2015 - Citeseer
The main objective of the paper is to present different types of Security attacks, their effects
and defense mechanisms in Wireless Sensor Network which is vulnerable to security attacks …

Trapdoor privacy in asymmetric searchable encryption schemes

A Arriaga, Q Tang, P Ryan - … 7th International Conference on Cryptology in …, 2014 - Springer
Asymmetric searchable encryption allows searches to be carried over ciphertexts, through
delegation, and by means of trapdoors issued by the owner of the data. Public Key …

[PDF][PDF] Electronic Mail Security

A Qashqari, D Alhbshi, F Alzahrani… - International Journal of …, 2020 - academia.edu
Over the past years, the number of email users has clearly increased, and email has
become a means of communication among thousands of users across continents. In this …

[PDF][PDF] A comparative study on the application of biometric technologies for authentication in online banking.

S Parusheva - Egyptian Computer Science Journal, 2015 - researchgate.net
In recent years online banking is gaining more and more acceptance thanks to the many
advantages and conveniences it provides both for customers and financial institutions. One …

[PDF][PDF] SEPS-AKA: A secure evolved packet system authentication and key agreement scheme for LTE-A networks

Z Haddad, S Taha, I Sarwat - … Science & Information Technology (CS & …, 2010 - csitcp.com
In this paper, we propose a secure authentication of the Evolved Packet System
Authentication and Key Agreement (EPS-AKA) for the LTE-A network. Our scheme is …

Resolving privacy-preserving relationships over outsourced encrypted data storages

A Huertas Celdrán, G Dólera Tormo… - International Journal of …, 2016 - Springer
Due to the numerous advantages in terms of cost reduction, usability, and flexibility, today
we are witnessing the adoption of solutions where individuals and enterprises prefer to …

Pengaruh Kapabilitas Teknologi Informasi Dan Kualitas Sumber Daya Manusia Terhadap Keamanan Sistem Informasi Akuntansi (studi Pada Bank Bjb Pusat Kota …

KP Estiningtyas - 2022 - repository.ekuitas.ac.id
Penelitian ini bertujuan untuk mengetahui seberapa besar pengaruh kapabilitas teknologi
informasi dan kualitas sumber daya manusia terhadap keamanan sistem informasi …

[PDF][PDF] MODIFICATIONS OF AN ENCRYPTED-BASED SQL MODELS FOR MULTILEVEL DATABASE

AY MAHMOUD, MM ABU-SAQER - Journal of Theoretical and Applied …, 2022 - jatit.org
Information security is becoming increasingly vital in a variety of applications. Database
applications are no exception, and protecting information based on encryption plays a vital …

Fogging the cloud—Implementing and evaluating searchable encryption schemes in practice

M Koschuch, M Hombauer… - 2015 IFIP/IEEE …, 2015 - ieeexplore.ieee.org
With the rise of cloud computing new ways to secure outsourced data have to be devised.
Traditional approaches like simply encrypting all data before it is transferred only partially …

AN ASSESSMENT MODEL FOR E-GOVERNMENT INFORMATION SECURITY TRUST

YN Imamverdiyev - Problems of Information Technology, 2015 - jpit.az
Ensuring public trust in the e-government information security is essential for full use of the
potential of e-government. In this paper, we analyze the mechanisms for building trust in the …