|
|
|
Alan Huang and Justie Su-Tzu Juan
A personal camera fingerprint can be created from images in social media by using Photo Response Non-Uniformity (PRNU) noise, which is used to identify whether an unknown picture belongs to them. Social media has become ubiquitous in recent years and man...
ver más
|
|
|
|
|
|
|
Bimal Kumar Roy and Anandarup Roy
Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a share th...
ver más
|
|
|
|
|
|
|
Tao Feng, Dewei Wang and Renbin Gong
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine...
ver más
|
|
|
|
|
|
|
Ou Ruan, Changwang Yan, Jing Zhou and Chaohao Ai
Multiparty Private Set Intersection (MPSI) is dedicated to finding the intersection of datasets of multiple participants without disclosing any other information. Although many MPSI protocols have been presented, there are still some important practical ...
ver más
|
|
|
|
|
|
|
Yu-Hong Chen and Justie Su-Tzu Juan
XOR-based Visual Cryptography Scheme (XOR-based VCS) is a method of secret image sharing. The principle of XOR-based VCS is to encrypt a secret image into several encrypted images, called shares. No information about the secret can be obtained from any o...
ver más
|
|
|
|
|
|
|
Agus Winarno and Riri Fitri Sari
Personal data security is a cybersecurity trend that has captured the world?s attention. Governments, practitioners and academics are jointly building personal data security in various communication systems, including IoT. The protocol that is widely use...
ver más
|
|
|
|
|
|
|
Tianyu Bai, Song Fu and Qing Yang
With the wider adoption of edge computing services, intelligent edge devices, and high-speed V2X communication, compute-intensive tasks for autonomous vehicles, such as object detection using camera, LiDAR, and/or radar data, can be partially offloaded t...
ver más
|
|
|
|
|
|
|
Soohyeon Choi and Dohoon Kim
Illegally filmed images, the sharing of non-consensually filmed images over social media, and the secret recording and distribution of celebrity images are increasing. To catch distributors of illegally filmed images, many investigation techniques based ...
ver más
|
|
|
|
|
|
|
Natasha Tanzila Monalisa,Shinthi Tasnim Himi,Nayeema Ferdous,Md. Ezharul Islam,Anup Majumder
Pág. pp. 97 - 112
Though in this modern society men and women are said to be given equal rights, having no gender discrimination, women are still considered weak and endlessly facing rape, domestic violence, eve-teasing, workplace violence, physical assault, cyberbullying...
ver más
|
|
|
|
|
|
|
Hayder Najm,Haider K. Hoomod,Rehab Hassan
Pág. pp. 184 - 199
The concept Web of Things (WoT) goes well beyond the emphasis on the Internet as a means of sharing data, instead of introducing all resources and connections involving computers, data, and people to the Web. It, therefore, focuses on a range of problems...
ver más
|
|
|
|