Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Gerard Draper Gil"'
Publikováno v:
IEEE Access, Vol 8, Pp 130066-130081 (2020)
With hundred billions of emails sent daily, the adoption of contemporary email security standards and best practices by the respective providers are of utmost importance to everyone of us. Leaving out the user-dependent measures, say, S/MIME and PGP,
Externí odkaz:
https://doaj.org/article/7120061f40174b989e6c3d6347e9cd4e
Publikováno v:
IEEE Access, Vol 8, Pp 130066-130081 (2020)
With hundred billions of emails sent daily, the adoption of contemporary email security standards and best practices by the respective providers are of utmost importance to everyone of us. Leaving out the user-dependent measures, say, S/MIME and PGP,
Publikováno v:
IWBF
Electric Network Frequency (ENF) fluctuates over time around the nominal value because of power load changes. Such fluctuations have a subtle influence on the artificial light emitted by sources that are supplied by the electric grid. Captured by cam
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030687335
Electricity is transported through the network as alternate current, usually at a carrier frequency (50/60 Hz) which is known as Electric Network Frequency (ENF). In practice, ENF fluctuates around the nominal value because of changes in the supply a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::65cf62aebec1271f62a61c37d6302961
https://doi.org/10.1007/978-3-030-68734-2_7
https://doi.org/10.1007/978-3-030-68734-2_7
Publikováno v:
Computer Standards & Interfaces. 57:20-30
A large number of certified email proposals have been published over the last thirty years. Many use a trusted third party (TTP) to guarantee the core security property: fairness; however, the verifiability of this TTP has not received enough attenti
Autor:
Ali A. Ghorbani, Arash Habibi Lashkari, Kenneth Fon Mbah, Jonathan Edward Keenan, Gerard Draper Gil
Publikováno v:
ICCNS
During the last decade, botnet emerged as one of the most serious malware which possess a serious threat to the Internet. Due to significant research effort in this domain there are many different detection methods based on diverse technical principl
Publikováno v:
International Journal of Information Security. 12:299-318
The study of business transactions is a topic of interest in the field of electronic commerce. Fair Exchange protocols deal with the problem of how the different parties involved in a transaction can exchange their parts securely, i.e., with assuranc
Publikováno v:
The Computer Journal. 56:1258-1267
Publikováno v:
ICISSP
Traffic characterization is one of the major challenges in today’s security industry. The continuous evolution and generation of new applications and services, together with the expansion of encrypted communications makes it a difficult task. Virtu
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319233178
ISC
ISC
This paper presents an efficiency study of fair exchange protocols for Multi-Party Contract Signing MPCS from their architecture point of view, an approach that has not been previously explored. A set of common topologies is presented and defined: ri
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5ed0f3305e55bdf739a275b7c5ab497b
https://doi.org/10.1007/978-3-319-23318-5_13
https://doi.org/10.1007/978-3-319-23318-5_13