scispace - formally typeset
Search or ask a question

Answers from top 7 papers

More filters
Papers (7)Insight
Proceedings ArticleDOI
Joo Guan Ooi, Kok Horng Kam 
15 Jul 2009
17 Citations
The information obtained can be used to circumvent popular disk encryption system such as FileVault and Bit Locker.
The advantage of these modes is only using encryption algorithm for both encryption and decryption.
Theoretical analysis results show that the proposed encryption scheme has effective encryption and efficiencies.
However, this does not mean that it is elusive for the opponents to attack optical encryption systems.
All these features show that our encryption algorithm is very suitable for digital image encryption.
Book ChapterDOI
Michael Coles, Rodney Landrum 
01 Jan 2009
34 Citations
Cell-level encryption can be an extremely useful tool for targeted data encryption, but it does have some drawbacks.
Our simulation results demonstrate the delay performance, as well as, the queue requirements for the Aegis encryption scheme versus the full encryption and no encryption schemes.

See what other people are reading

What is microsoft fabric?
7 answers
Microsoft's Service Fabric (SF) is a comprehensive distributed platform designed to facilitate the development, deployment, and maintenance of microservice applications in the cloud. SF distinguishes itself by its extensive use in production environments for over a decade, underpinning many of Microsoft's critical services. The platform is built on a foundation of key design principles that prioritize modularity and support for robust semantics, including fault tolerance and consistency across its architectural components. This approach enables SF to offer a reliable and efficient environment for running large-scale services, as evidenced by lessons learned and experimental results derived from production data. SF's architecture is not just about running services; it also emphasizes the creation and management of these services through a bottom-up approach, focusing on the intricate details of its low-level components. This meticulous attention to the underlying structure ensures that each element of SF contributes to the overall goal of providing a resilient and adaptable platform for microservices. In the broader context of distributed systems and fabric-based solutions, SF's role is part of a larger ecosystem that includes various fabric technologies aimed at enhancing the security, efficiency, and scalability of distributed information systems and cloud computing environments. These technologies range from systems like Fabric, which focuses on building secure distributed information systems with a high-level programming language, to infrastructures like FABRIC, which enables experimental research in networking and distributed computing at a national scale. Additionally, solutions like Scalable Fabric address desktop complexity and task management, while innovative platforms like the Forward Fabric platform system integrate with data center platforms for enhanced connectivity and management. Furthermore, the FABRIC project aims to integrate middleware standards for high-quality streaming over heterogeneous networks, and the FABRIC scheme proposes secure cloud data sharing through proxy re-encryption. Together, these fabric-based technologies, including Microsoft's Service Fabric, represent a multifaceted approach to tackling the challenges of modern computing environments, from cloud services to secure data sharing and beyond.
What are cyber physical systems?
8 answers
Cyber-Physical Systems (CPS) are integrations of computation, networking, and physical processes. Embedded computers and networks monitor and control the physical processes, usually with feedback loops where physical processes affect computations and vice versa. The rapid proliferation of CPS across various sectors, including critical infrastructure, transportation, healthcare, and the energy industry, underscores the pressing need for robust cybersecurity mechanisms to protect these systems from cyberattacks. These systems are not only foundational to the operation of smart grids, smart cities, and intelligent transport networks but also play a crucial role in emerging Internet of Things (IoT) applications like remote surgery and healthcare, which generate delay-sensitive tasks requiring timely processing. Moreover, the concept of Cyber-Physical-Social Systems (CPSS) extends CPS by integrating dynamic stochastic hybrid systems with social systems, thereby enhancing control and accessibility in domains such as smart homes and healthcare systems. The application of computational techniques like game theory in CPS facilitates interaction among different entities to achieve selected objectives, showcasing the systems' ability to address a variety of technical challenges. In the context of human-centered computing, human cyber-physical systems demonstrate how cyber and physical layers can be designed to interact with humans, as seen in the monitoring of motion sickness in seafarers. The transition to a circular economy is further facilitated by CPS, demonstrating their potential to increase efficiency and reduce waste in industrialization, thereby contributing to sustainable development goals. In home energy management, CPS architectures encompass data acquisition, communication networks, and data analytics to optimize energy consumption. Healthcare benefits from CPS through intelligent feedback systems and the monitoring of patients with biosensors, although security remains a critical issue. The resilience of cyber-physical production systems (CPPS) in industrial environments highlights the importance of addressing complex structures and data volume challenges. Lastly, the advent of quantum computing poses new challenges and opportunities for enhancing the cyber-physical defense of these systems.
How does the division of EHRs into different categories or compartments improve data security and privacy?
5 answers
The division of Electronic Health Records (EHRs) into different categories or compartments enhances data security and privacy by implementing dedicated security zones for each layer, allowing individual authentication and authorization requirements, and securing data separately. This approach reduces network load, minimizes sensitive data transfer, and leverages edge computing for basic data processing on smart sensors, enhancing security and privacy. Additionally, utilizing Attribute-based Encryption (ABE) with ontology reasoning in a graph-based EHR system ensures fine-grained field-level security, protecting patient privacy and data security while handling heterogeneous data effectively. Furthermore, a Two-Phased Privacy Preserving Security Scheme (TP3SS) employs secure access control and attribute-based encryption, establishing mutual key-dependent smart contracts and using Hyperledger fabric blockchain for record management, preventing unauthorized access and enhancing security levels.
How accurate are mobile device sensors in detecting hidden cameras?
5 answers
Mobile device sensors have shown varying degrees of accuracy in detecting hidden cameras. LAPD utilizes time-of-flight sensors on smartphones to achieve a high hidden camera detection rate, outperforming traditional detectors and the naked eye. DeWiCam proposes a lightweight detection mechanism on smartphones, achieving a remarkable 99% accuracy in detecting nearby wireless cameras within seconds. SCamF leverages smartphones to detect and locate wireless spy cameras by analyzing encrypted Wi-Fi network traffic, achieving a high classification accuracy of 98% and a true positive rate of 97% for detecting spy cameras. These innovative approaches highlight the potential of mobile device sensors in accurately detecting hidden cameras, offering improved privacy protection in various settings.
What are the best practices for implementing backups in an OpenNebula environment?
4 answers
Best practices for implementing backups in an OpenNebula environment involve utilizing methods like creating snapshots and backups of application output in virtual machines. Additionally, employing a system backup solution can prevent data loss by duplicating and storing server data periodically. Implementing hardware-based mirroring technology can ensure direct mirroring of NVRAM data between servers at an atomic level, enhancing data redundancy and protection. For backing up encrypted data in backend storage without exposing it, a frontend client system with client-controlled keys and minimal server-side processes is recommended. Furthermore, a computer-implemented method for backups may involve identifying data volumes, locating data objects, and backing up references to data objects in archival data stores, optimizing backup efficiency. These practices collectively enhance data protection and recovery capabilities in an OpenNebula environment.
- How can the privacy of patient data be safeguarded when utilizing IoT technologies in healthcare environments?
5 answers
To safeguard patient data privacy in healthcare environments utilizing IoT technologies, various security measures are crucial. Implementing cryptographic techniques like Light-Weight Cryptography (LWC)can ensure data security by encrypting sensitive information collected by IoT devices. Additionally, utilizing edge computingcan help in local computation of data, reducing cloud traffic and enhancing privacy protection. Furthermore, early detection methodologies for attacks like keyloggersand employing blockchain-based distributed authenticationcan enhance security measures. These approaches collectively address the critical security concerns related to patient data privacy in IoT healthcare applications, mitigating risks of unauthorized access, hacking, breaches, and ensuring confidentiality of sensitive medical information.
How does LTE-A improved LTE?
5 answers
LTE-A improves LTE by addressing security weaknesses through advanced authentication and encryption mechanisms, employing Elliptic Curve Cryptography (ECC) and Salsa20 algorithm for enhanced end-to-end security. It enhances network quality of service (QoS) by implementing novel algorithms like Dinkelbach’s method for energy optimization and 3D beamforming for user-specific QoS. LTE-A also boosts capacity and throughput by utilizing moving and fixed relay nodes with half-duplex mode, leading to significant throughput improvements for vehicular users and enhanced coverage at cell edges. Additionally, LTE-A optimizes control channel resource demapping by reducing resource consumption and improving operation speed through FIR filters and PBCH decoding. Furthermore, LTE-A mitigates intercell interference in heterogeneous networks by proposing LS-LMMSE and ESAGE-MAP methods, resulting in improved system performance and throughput.
How does IoT technology handle data security in home security systems?
5 answers
IoT technology addresses data security in home security systems through various means. It enables real-time sensor data communication and processing for custom-made home security systems, ensuring easy access for the elderly. By integrating machine learning models for threat detection, IoT networks can enhance security algorithms, detect vulnerabilities, and forecast risks effectively. The interconnected nature of smart homes poses security challenges, emphasizing the need for robust security measures to prevent data breaches and theft. Secure data transmission and authentication mechanisms are crucial for maintaining data integrity and confidentiality in IoT-based smart home appliances, safeguarding against data leakage and external interventions. Overall, IoT technology in home security systems prioritizes data security through advanced technologies and protocols to protect sensitive information effectively.
What is prisma systematic reviw method?
5 answers
The PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analysis) method is a systematic approach used in various fields of study for conducting comprehensive literature reviews. It involves a structured process for reviewing and analyzing existing research articles to provide a rigorous, transparent, and replicable summary of the current knowledge on a specific topic. PRISMA guidelines help researchers in selecting relevant articles, extracting key information, and synthesizing findings to identify trends, gaps, and recommendations for future work. This method ensures that the review process is conducted with precision and clarity, enhancing the quality and reliability of the synthesized information for researchers interested in a particular subject area.
Is there examples of position paper about Should homework be mandatory?
5 answers
A position paper is a valuable tool for presenting opinions on various issues. While the provided contexts cover diverse topics such as Chronic Obstructive Pulmonary Disease (COPD), multimodality in argumentation studies, and drug allergy diagnosis methods, they do not specifically address the topic of whether homework should be mandatory. However, the essence of a position paper remains consistent across these contexts, emphasizing the importance of substantiating opinions with evidence and engaging in objective discussions. To find examples of position papers specifically addressing the mandatory nature of homework, one would need to explore literature or academic sources focusing on education policies and practices.
Why data security is important in itcompanies?
4 answers
Data security is crucial for IT companies due to the sensitive nature of the information they handle. IT companies deal with vast amounts of data, including personally identifiable information, which, if compromised, can lead to severe consequences such as data breaches, financial losses, and damage to reputation. Implementing robust data security measures, such as encryption and access control, is essential to protect data from loss, unauthorized access, and alteration throughout its lifecycle. Moreover, ensuring employee accountability, providing security education and training, and fostering a strong organizational culture around data security are vital components in safeguarding sensitive information. By prioritizing data security, IT companies can maintain trust with customers, comply with data protection regulations, and mitigate cyber risks effectively.