Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- rapid-communicationNovember 2024
Some results on vulnerability parameters and Wiener-type indices
Discrete Applied Mathematics (DAMA), Volume 358, Issue CPages 262–271https://doi.org/10.1016/j.dam.2024.07.016AbstractLet f ( x ) be a function on x. The Wiener-type indices, denoted by W f ( G ), is defined as W f = W f ( G ) = ∑ { u , v } ⊆ V ( G ) f ( d G ( u , v ) ). In this note, we use Wiener-type indices to give some sufficient conditions for lower bounds ...
- research-articleOctober 2024
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication
International Journal of Information Security (IJOIS), Volume 24, Issue 1https://doi.org/10.1007/s10207-024-00931-yAbstractThe security of online assessments is a major concern due to widespread cheating. One common form of cheating is impersonation, where students invite unauthorized persons to take assessments on their behalf. Several techniques exist to handle ...
- research-articleOctober 2024
Morpheus: An efficient timing-based attestation framework for safeguarding hypervisor integrity with dynamic trust
AbstractHypervisor, the core software in cloud computing, is susceptible to malicious intrusions, potentially jeopardizing overall platform security. Physical hosts within the cloud computing environment constantly face persistent attacks, and not all ...
- research-articleSeptember 2024
Efficient handover authentication protocol with message integrity for mobile clients in wireless mesh networks
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103806AbstractWireless Mesh Network (WMN) has become the most favorable choice among various networking options due to its distributed nature. It offers continuous Internet services, in comparison with other conventional networks, through a self-healing and ...
- research-articleJuly 2024
Trustworthiness and explainability of a watermarking and machine learning-based system for image modification detection to combat disinformation
- Andrea Rosales,
- Agnieszka Malanowska,
- Tanya Koohpayeh Araghi,
- Minoru Kuribayashi,
- Marcin Kowalczyk,
- Daniel Blanche-Tarragó,
- Wojciech Mazurczyk,
- David Megías
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 76, Pages 1–10https://doi.org/10.1145/3664476.3670934The widespread use of digital platforms, prioritising content based on engagement metrics and rewarding content creators accordingly, has contributed to the proliferation of disinformation and its far-reaching social and political impact. In addition, ...
-
- research-articleJune 2024
Towards Enhanced Data Integrity and Accountability: Leveraging Blockchain Technology in Healthcare
PETRA '24: Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive EnvironmentsPages 587–592https://doi.org/10.1145/3652037.3663889The management of electronic health records in modern healthcare systems is crucial. To ensure confidentiality, integrity, and accessibility, regulations such as GDPR and HIPAA have been established in several countries. Various research studies have ...
- research-articleAugust 2024
ProtAIN: Protecting the Authenticity and Integrity Properties of NFT Images
CompSysTech '24: Proceedings of the International Conference on Computer Systems and Technologies 2024Pages 16–23https://doi.org/10.1145/3674912.3674931Non-Fungible Tokens (or, for short, NFT) establish the ownership and the authenticity of digital assets. Regardless the high security levels provided by blockchain, are not excluded the cases where the ownership of a digital object may be claimed ...
- research-articleJune 2024
Disinformation detection and source tracking using semi-fragile watermarking and blockchain
EICC '24: Proceedings of the 2024 European Interdisciplinary Cybersecurity ConferencePages 136–143https://doi.org/10.1145/3655693.3655718A blind semi-fragile watermarking scheme for disinformation detection in online social media (OSM) is presented. The proposed scheme can be used for both images and videos. We also propose a blockchain-based framework for traceability and propagation ...
- research-articleJuly 2024
MitM attacks on intellectual property and integrity of additive manufacturing systems: A security analysis
AbstractAdditive Manufacturing (AM) was originally invented to reduce the cost of the prototyping process. Over time, the technology evolved to be faster, more accurate, and affordable. These factors, in addition to the potential use of AM in parts ...
- research-articleApril 2024
CIA Security for Internet of Vehicles and Blockchain-AI Integration
AbstractThe lack of data security and the hazardous nature of the Internet of Vehicles (IoV), in the absence of networking settings, have prevented the openness and self-organization of the vehicle networks of IoV cars. The lapses originating in the areas ...
- research-articleMay 2024
Certificateless cloud storage auditing supporting data ownership transfer
AbstractCloud storage auditing allows the data owner/verifier to check whether the cloud correctly stores data owners' data. In cloud storage auditing scenario, data ownership transfer is a non-negligible problem. However, the existing cloud storage ...
- ArticleJune 2024
An End-to-End Secure Solution for IoMT Data Exchange
Applied Cryptography and Network Security WorkshopsPages 3–15https://doi.org/10.1007/978-3-031-61486-6_1AbstractIn the field of healthcare, the emerging concept of the Internet of Medical Things (IoMT) plays a crucial role in enhancing the efficiency of medical services and introducing innovative solutions. Traditional healthcare services are no longer ...
- research-articleFebruary 2024
Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach
Journal of Cloud Computing: Advances, Systems and Applications (JOCCASA), Volume 13, Issue 1https://doi.org/10.1186/s13677-024-00606-yAbstractCloud computing is a new paradigm in this new cyber era. Nowadays, most organizations are showing more reliability in this environment. The increasing reliability of the Cloud also makes it vulnerable. As vulnerability increases, there will be a ...
- research-articleJanuary 2024
Integrity-based Explanations for Fostering Appropriate Trust in AI Agents
ACM Transactions on Interactive Intelligent Systems (TIIS), Volume 14, Issue 1Article No.: 4, Pages 1–36https://doi.org/10.1145/3610578Appropriate trust is an important component of the interaction between people and AI systems, in that “inappropriate” trust can cause disuse, misuse, or abuse of AI. To foster appropriate trust in AI, we need to understand how AI systems can elicit ...
- research-articleJuly 2024
Analysis of Lightweight Cryptographic Algorithms for IoT Gateways
Procedia Computer Science (PROCS), Volume 233, Issue CPages 235–242https://doi.org/10.1016/j.procs.2024.03.213AbstractThis research work explores the growing role of IoT devices in daily life and the increasing demand for secure data transmission in different sectors like healthcare, military, etc. Moreover, this study focuses on the recent advancements in ...
- rapid-communicationDecember 2023
A note on the integrity of grids
Discrete Applied Mathematics (DAMA), Volume 341, Issue CPages 55–59https://doi.org/10.1016/j.dam.2023.07.019AbstractIn this paper we study the integrity of grid-graphs P m □ P n. We prove that if n 1 / 2 + α < m ≤ n, α > 0, then the integrity of P m □ P n is asymptotically equal to ( 2 2 / 3 + 2 − 1 / 3 ) ( m n ) 2 / 3.
- research-articleMay 2024
An Adaptive Image Watermarking based on Bellman-Ford Algorithm
ICFNDS '23: Proceedings of the 7th International Conference on Future Networks and Distributed SystemsPages 357–365https://doi.org/10.1145/3644713.3644762Ensuring the integrity and authenticity of images is a paramount task in the digital multimedia context. The emergence of digital technologies necessitates the development of robust techniques to safeguard medical images against tampering or ...
- ArticleJanuary 2024
A Survey on Security in Data Transmission in IoT: Layered Architecture
AbstractThe Internet of Things (IoT) is the communications technology where, physical objects, which are basically not designed for connection, will be able to connect, create, receive and exchange collected data permanently and transparently. Many IoT ...
- research-articleNovember 2023
Galileo high accuracy service performance and anomaly mitigation capabilities
AbstractPrecise point positioning (PPP) and real-time kinematic techniques are interesting in several sectors, especially for autonomous applications. These users have high accuracy needs coupled with stringent requirements on continuity, availability, ...
- research-articleOctober 2023
Wiener index and vulnerability parameters of graphs
Discrete Applied Mathematics (DAMA), Volume 338, Issue CPages 56–68https://doi.org/10.1016/j.dam.2023.05.020AbstractLet G be a finite simple graph with vertex set V ( G ). We define the Wiener index of G as W ( G ) = ∑ { u , v } ∈ V ( G ) d ( u , v ), where d ( u , v ) is the distance between u and v. This topological index was defined by Wiener in ...