[HTML][HTML] A deeper look into cybersecurity issues in the wake of Covid-19: A survey
This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime,
highlighting the wide spectrum of cyberattacks that occurred around the world. The modus …
highlighting the wide spectrum of cyberattacks that occurred around the world. The modus …
Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …
Exploring the challenges of and solutions to sharing personal genomic data for use in healthcare
Boosted by the COVID-19 pandemic, as well as the tightened General Data Protection
Regulation (GDPR) legislation within the European Union (EU), individuals have become …
Regulation (GDPR) legislation within the European Union (EU), individuals have become …
Study on the evolution of Chinese characters based on few-shot learning: From oracle bone inscriptions to regular script
M Wang, Y Cai, L Gao, R Feng, Q Jiao, X Ma, Y Jia - Plos one, 2022 - journals.plos.org
Oracle bone inscriptions (OBIs) are ancient Chinese scripts originated in the Shang Dynasty
of China, and now less than half of the existing OBIs are well deciphered. To date …
of China, and now less than half of the existing OBIs are well deciphered. To date …
HoneyDetails: A prototype for ensuring patient's information privacy and thwarting electronic health record threats based on decoys
Advancements in electronic health record system allow patients to store and selectively
share their medical records as needed with doctors. However, privacy concerns represent …
share their medical records as needed with doctors. However, privacy concerns represent …
Differential privacy and natural language processing to generate contextually similar decoy messages in honey encryption scheme
K Panchal - arxiv preprint arxiv:2010.15985, 2020 - arxiv.org
Honey Encryption is an approach to encrypt the messages using low min-entropy keys, such
as weak passwords, OTPs, PINs, credit card numbers. The ciphertext is produces, when …
as weak passwords, OTPs, PINs, credit card numbers. The ciphertext is produces, when …
[PDF][PDF] Honey Encryption Security Techniques: A Review Paper
A Gharbi, A Nori - AL-Rafidain Journal of Computer Sciences and …, 2022 - iasj.net
From time to time, we hear in the news about a breach or attack on some well-known
companies as just news, but it is a serious problem because it is the privacy of citizens, their …
companies as just news, but it is a serious problem because it is the privacy of citizens, their …
Honey Encryption: implementation challenges and solutions
R Lindholm - 2019 - jyx.jyu.fi
Most encryption techniques have one essential problem: they are vulnerable to brute-force
attacks. In 2014, a new defence mechanism was introduced against brute-force attack and …
attacks. In 2014, a new defence mechanism was introduced against brute-force attack and …
Secure Storage System Using Cryptographic Techniques
M AlShalaan, R AlSubaie, A Ara - … of Women in Data Science at …, 2022 - ieeexplore.ieee.org
In the era of Internet usage growth, storage services are widely used where users' can store
their data, while hackers techniques pose massive threats to users' data security. The …
their data, while hackers techniques pose massive threats to users' data security. The …
Security analysis of an efficient null space-based homomorphic MAC scheme against tag pollution attacks in RLNC
J Chang, B Shao, A Zhang, G Bian, Y Ji, M Xu - IEEE Access, 2019 - ieeexplore.ieee.org
Recently, Esfahani, Mantas, and Rodriguez proposed a homomorphic message
authentication code (MAC) scheme for the random linear network coding (RLNC) to resist …
authentication code (MAC) scheme for the random linear network coding (RLNC) to resist …