|
|
|
John E. Marthinsen and Steven R. Gordon
The failure of major banks in 2023, such as Silicon Valley Bank (SVB), Signature Bank, First Republic Bank, and Credit Suisse, points to the continuing need for financial institutions to price liquidity risk properly and for financial systems to find alt...
ver más
|
|
|
|
|
|
|
Manal Rajeh AlShalaan and Suliman Mohamed Fati
To address a business need, most organizations allow employees to use their own devices to enhance productivity and job satisfaction. For this purpose, the Bring Your Own Device (BYOD) policy provides controllable access for employees to organize data th...
ver más
|
|
|
|
|
|
|
Lucas Mayr, Lucas Palma, Gustavo Zambonin, Wellington Silvano and Ricardo Custódio
Private key management is a complex obstacle arising from the traditional public key infrastructure model. However, before any related security breach can be addressed, it must first be reliably detected. Certificate Transparency (CT) is an example of a ...
ver más
|
|
|
|
|
|
|
Yi-Wei Wang and Ja-Ling Wu
This work presents an efficient and effective system allowing hospitals to share patients? private information while ensuring that each hospital database?s medical records will not be leaked; moreover, the privacy of patients who access the data will als...
ver más
|
|
|
|
|
|
|
Marin Vidakovic and Kruno Milicevic
The continuous development of quantum computing necessitates the development of quantum-resistant cryptographic algorithms. In response to this demand, the National Institute of Standards and Technology selected standardized algorithms including Crystals...
ver más
|
|
|
|
|
|
|
Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi and Amna Eleyan
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove...
ver más
|
|
|
|
|
|
|
Omar I. Dallal Bashi, Shymaa Mohammed Jameel, Yasir Mahmood Al Kubaisi, Husamuldeen K. Hameed and Ahmad H. Sabry
Security identification solutions against WLAN network attacks according to straightforward digital detectors, such as SSID, IP addresses, and MAC addresses, are not efficient in identifying such hacking or router impersonation. These detectors can be si...
ver más
|
|
|
|
|
|
|
Oluwakemi Christiana Abikoye, Esau Taiwo Oladipupo, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, Cheng-Chi Lee and Chun-Ta Li
The application of the Internet of Medical Things (IoMT) in medical systems has brought much ease in discharging healthcare services by medical practitioners. However, the security and privacy preservation of critical user data remain the reason the tech...
ver más
|
|
|
|
|
|
|
Emmanuel A. Adeniyi, Peace Busola Falola, Mashael S. Maashi, Mohammed Aljebreen and Salil Bharany
With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users? credentials and sensitive information. Therefore, ...
ver más
|
|
|
|
|
|
|
Marta Tremolada, Lucio Silingardi and Livia Taverna
The evolution of digital media has changed the patterns and motives for its use among adolescents and has impacted their communication choices within their family and social networks. The objectives of this study are to understand whether peers communica...
ver más
|
|
|
|