Your browser doesn't support javascript.
Show: 20 | 50 | 100
Results 1 - 9 de 9
Filter
1.
Electronics ; 12(11):2496, 2023.
Article in English | ProQuest Central | ID: covidwho-20234583

ABSTRACT

Currently, the volume of sensitive content on the Internet, such as pornography and child pornography, and the amount of time that people spend online (especially children) have led to an increase in the distribution of such content (e.g., images of children being sexually abused, real-time videos of such abuse, grooming activities, etc.). It is therefore essential to have effective IT tools that automate the detection and blocking of this type of material, as manual filtering of huge volumes of data is practically impossible. The goal of this study is to carry out a comprehensive review of different learning strategies for the detection of sensitive content available in the literature, from the most conventional techniques to the most cutting-edge deep learning algorithms, highlighting the strengths and weaknesses of each, as well as the datasets used. The performance and scalability of the different strategies proposed in this work depend on the heterogeneity of the dataset, the feature extraction techniques (hashes, visual, audio, etc.) and the learning algorithms. Finally, new lines of research in sensitive-content detection are presented.

2.
Journal of Engineering and Applied Science ; 70(1):33, 2023.
Article in English | ProQuest Central | ID: covidwho-2304599

ABSTRACT

Interest in leveraging blockchain technology to boost healthcare and e-health solutions has lately increased. Blockchain has proven to have enormous promise in a range of e-health industries because of its decentralized and reliable nature, including the secure exchange of electronic health records (EHRs) and database access management among numerous medical entities. A unique paradigm known as the "patient-centric approach” places the patient at the center of the healthcare system and gives them complete control over who has access to and can share their personal health information. Strong confidentiality and safety requirements are necessary for health information. Additionally, other concerns must be resolved, such as secrecy, interoperability, scalability, cost-effectiveness, and timeliness. This paper offers a patient-centric privacy-preserving framework for an efficient and safe medical record to address these problems. Based on three parameters transaction cost, execution time, and gas cost. Three blockchain platforms are compared by using the smart contract to find out the suitable platform for the implementation of this framework. Blockchain platforms served as a benchmark for the performance assessment of a designed framework. Although blockchain will not fix every issue in healthcare organizations, it will undoubtedly assist in dramatically reducing some of the most critical ones.

3.
14th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2022 ; 2022.
Article in English | Scopus | ID: covidwho-2018698

ABSTRACT

Digital transformation of public or private services, although it brings many improvements for our societies, it also raises security issues, mainly when focusing on the migration of physical signed documents in the digital environment. Digital signatures have proven to be reliable, thus they have seen a higher adoption in the last few years, especially in the context of the Covid-19 pandemic. Yet, a disadvantage is that digital signatures are volatile, being valid only for a maximum of a few years, depending on the validity of the asymmetric private key used to create that digital signature. Thus, validating a signed document after a few years could prove to be troublesome. In order to solve this problem, legislative and standardization efforts have been made and the legal and technical frameworks for long-term preservation services have been issued. In this paper we focus on the presentation of our implementation of a long-term preservation service for digital signatures, that is part of an entire long-term preservation system composed of multiple services, as mentioned in the paper. Our implementation is compliant with ETSI standards and uses the capabilities of current PKI infrastructures, while also adding in the resilience and trust of the blockchain. © 2022 IEEE.

4.
Webology ; 19(2):2025-2035, 2022.
Article in English | ProQuest Central | ID: covidwho-1957979

ABSTRACT

Now-a-days E-Learning System is very popular. But in this COVID-19 pandemic situation, it has become necessity. Classes, examinations, even result generation have all been done through online. But it involves several types of threats and risk factors as it is based on electronic communication media. To implement authenticity, integrity and non-repudiation of the information, we must use suitable encryption technique. In this paper we have proposed an object oriented analysis and design of El Gamaldigital signature algorithm to implement authenticity, integrity and non-repudiation of mark sheet which would be generated by the Admin for the student at the time of publishing the result of an examination. We also have analysed the performance using a standard object oriented metric such as Metric for Object Oriented Design (MOOD metric) to ensure the software quality as well as justifying the good software design of our proposed model.

5.
Journal of Higher Education Theory and Practice ; 22(5):104-114, 2022.
Article in English | ProQuest Central | ID: covidwho-1904640

ABSTRACT

The conceptualizations that doctrine has elaborated on cyberlaw have a visible interrelation between two disciplines: law and computer science. For this reason, this paper proposes to provide a foundation on the importance of teaching its contents at the university level in an autonomous method: encompassing them in a single course, and interdisciplinary;analyzing the information and communication technologies that underlie the legal regulation. To this end, we will examine the curriculum of the subject of Computer Law at a university in the Autonomous City of Buenos Aires, and will also inquire about the current status of its inclusion in the curricula of other universities in the district.

6.
Applied Sciences ; 12(11):5342, 2022.
Article in English | ProQuest Central | ID: covidwho-1892763

ABSTRACT

Assets such as warehouse receipts are important for enterprises, which can be used to pledge in supply chain finance (SCF). However, traditional pledges are performed manually, which inevitably encounters inefficiency and security problems such as multiple pledges. To improve asset security, we propose a blockchain-based digital asset platform (BDAP) with multi-party certification. BDAP not only has a security protocol based on the threshold ECDSA algorithm to make related participants confirm the authenticity of assets but also embeds a Verifiable Byzantine Fault Tolerant (VBFT) mechanism, randomly selecting the consensus nodes and improving the safety of the nodes. Moreover, data stored on the blockchain makes traceability possible. Through a set of experiments, we have verified the functionality and performance of BDAP. When the pressure test reaches 100 concurrent user volume, BDAP’s average response time is 1.441 s, showing a high ability to process transactions. However, now just a few open-minded banks are willing to access BDAP, it might take a long time to change the traditional perception of the participants in supply chain finance.

7.
International Journal of Advanced Computer Science and Applications ; 13(1), 2022.
Article in English | ProQuest Central | ID: covidwho-1836000

ABSTRACT

Nowadays, connected devices are growing exponen-tially;their produced data traffic has increased unprecedent-edly. Information systems security and cybersecurity are critical because data typically contain sensitive personal information, requiring high data protection. An authentication system manages and controls access to this data allowing the system to ensure the legitimacy of the access request. Most of the current identification and authentication systems are based on a centralized architec-ture. However, some concepts as Cloud computing and Blockchain use respectively distributed and decentralized architectures. Users without a central server will own platforms and applications of the next generation of Internet and Web3. This paper proposes AuSDiDe, a new authentication system for the distributed and decentralized structure. This solution aims to divide and share keys toward different and distributed nodes. The main objective of AuSDiDe is to securely store and manage passwords, private keys, and authentication based on the Shamir secret sharing algo-rithm. This new proposal significantly reinforces data protection in information security.

8.
Security and Communication Networks ; 2022, 2022.
Article in English | ProQuest Central | ID: covidwho-1832698

ABSTRACT

Robot Operating System (ROS) has received widespread utilization with the development of robotics, self-driving, etc., recently. Meanwhile, the other technology blockchain is frequently applied to various fields with its trustworthy characteristics and immutability in data storage. However, ROS has no ability to interact with the blockchain, which hinders research in related fields. Therefore, we wonder if we can develop a convenient tool to bridge ROS and blockchain. Inspired by this, we propose ROS-Ethereum. It bridges ROS and Ethereum, a widely used blockchain platform. ROS-Ethereum is based on the User Datagram Protocol (UDP) communication mechanism and the SM algorithm family along with Ethereum technology. Simply put, ROS-Ethereum allows users to invoke the contract when interacting with the blockchain, which makes this process easier and safer. We conduct experiments in real robots to verify the effectiveness of ROS-Ethereum and evaluate it from the following metrics: (1) the encryption efficiency and stability of the algorithm and (2) ROS-Ethereum transaction response time and packet loss rate.

9.
Security and Communication Networks ; 2022, 2022.
Article in English | ProQuest Central | ID: covidwho-1704227

ABSTRACT

Healthcare cyber-physical system significantly facilitates healthcare services and patient treatment effectiveness by analyzing patients’ health information data conveniently. Nevertheless, it also develops the threats to the confidentiality of health information, patients’ privacy, and decidability of medical disputes. And, with the advances of quantum computing technology, most existing anonymous authentication schemes are becoming a growing threat to traditional cryptosystems. To address these problems, for healthcare cyber-physical systems, we propose a new lattice-based self-enhancement authorized accessible privacy authentication scheme by using a strong designated verifier double-authentication-preventing signature technique, called SEAPA. The SEAPA achieves three security and privacy requirements including unforgeability, anonymity for patients’ information, and self-enhancement for patients themselves. A detailed security proof shows our proposal achieves those required security goals. Finally, our construction is demonstrated by parameter analysis and performance evaluation to have reasonable efficiency.

SELECTION OF CITATIONS
SEARCH DETAIL