To see the other types of publications on this topic, follow the link: Memory security.

Journal articles on the topic 'Memory security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Memory security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Apryshchenko, V. Yu. "Memory as Security." New Past, no. 3 (2016): 86–108. http://dx.doi.org/10.18522/2500-3224-2016-3-86-108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sha, Mo, Yifan Cai, Sheng Wang, Linh Thi Xuan Phan, Feifei Li, and Kian-Lee Tan. "Object-oriented Unified Encrypted Memory Management for Heterogeneous Memory Architectures." Proceedings of the ACM on Management of Data 2, no. 3 (2024): 1–29. http://dx.doi.org/10.1145/3654958.

Full text
Abstract:
In contemporary database applications, the demand for memory resources is intensively high. To enhance adaptability to varying resource needs and improve cost efficiency, the integration of diverse storage technologies within heterogeneous memory architectures emerges as a promising solution. Despite the potential advantages, there exists a significant gap in research related to the security of data within these complex systems. This paper endeavors to fill this void by exploring the intricacies and challenges of ensuring data security in object-oriented heterogeneous memory systems. We introd
APA, Harvard, Vancouver, ISO, and other styles
3

Lescisin, Michael, and Qusay H. Mahmoud. "Evaluation of Dynamic Analysis Tools for Software Security." International Journal of Systems and Software Security and Protection 9, no. 3 (2018): 34–59. http://dx.doi.org/10.4018/ijsssp.2018070102.

Full text
Abstract:
This article discusses the development of secure software by means of dynamic analysis tools. A secure software-based system should have security checks and balances integrated throughout its entire development lifecycle, including its deployment phase. Therefore, this article covers both using software security tools for testing code in development as well as monitoring code in deployment to ensure that it is operating securely. The security issues discussed in this article will be split into two categories – memory safety issues and input validation issues. Memory safety issues concern probl
APA, Harvard, Vancouver, ISO, and other styles
4

Yuliana, Mike, Nuril Hidayah, and Amang Sudarsono. "Implementation of Web-Based File Sharing Security System." MOTIVECTION : Journal of Mechanical, Electrical and Industrial Engineering 6, no. 1 (2024): 41–52. http://dx.doi.org/10.46574/motivection.v6i1.314.

Full text
Abstract:
File-sharing activities become a bridge for communication in the form of data between one party and another party. File sharing allows users to share data with other users, by uploading data to the server computer and other users can download data from the server computer. A document security system is indispensable to keep document data safe until its destination. File Web Sharing will transmit data with cryptographic methodologies. The algorithm used is Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Blowfish. This study aims to compare the performance of AES, DES, an
APA, Harvard, Vancouver, ISO, and other styles
5

Younan, Yves, Wouter Joosen, Frank Piessens, and Hans Van den Eynden. "Improving Memory Management Security for C and C++." International Journal of Secure Software Engineering 1, no. 2 (2010): 57–82. http://dx.doi.org/10.4018/jsse.2010040104.

Full text
Abstract:
Memory managers are an important part of modern language and are used to dynamically allocate memory. Many managers exist; however, two major types can be identified: manual memory allocators and garbage collectors. In the case of manual memory allocators, the programmer must manually release memory back to the system when it is no longer needed. Problems can occur when a programmer forgets to release it, releases it twice or uses freed memory. These problems are solved in garbage collectors. However, both manual memory allocators and garbage collectors store management information. This paper
APA, Harvard, Vancouver, ISO, and other styles
6

Crenne, Jérémie, Romain Vaslin, Guy Gogniat, Jean-Philippe Diguet, Russell Tessier, and Deepak Unnikrishnan. "Configurable memory security in embedded systems." ACM Transactions on Embedded Computing Systems 12, no. 3 (2013): 1–23. http://dx.doi.org/10.1145/2442116.2442121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gustafsson, Karl, and Maria Mälksoo. "Memory-Political Deterrence: Shielding Collective Memory and Ontological Security through Dissuasion." International Studies Quarterly 68, no. 1 (2024): 1–12. https://doi.org/10.1093/isq/sqae006.

Full text
Abstract:
Traditionally used within the context of hard military power in interstate relations, the concept of deterrence has been progressively extended to non-state actors and new issue areas. While scholarship on the social aspects of deterrence has expanded our understanding of this core international security practice, the focus of existing research has largely remained on physical security. This article argues that there is a phenomenon in international politics that can be called memory-political deterrence. Memory-political deterrence refers to the ways in which states seek to dissuade other pol
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Jinjae, Derry Pratama, Minjae Kim, Howon Kim, and Donghyun Kwon. "CoMeT: Configurable Tagged Memory Extension." Sensors 21, no. 22 (2021): 7771. http://dx.doi.org/10.3390/s21227771.

Full text
Abstract:
Commodity processor architectures are releasing various instruction set extensions to support security solutions for the efficient mitigation of memory vulnerabilities. Among them, tagged memory extension (TME), such as ARM MTE and SPARC ADI, can prevent unauthorized memory access by utilizing tagged memory. However, our analysis found that TME has performance and security issues in practical use. To alleviate these, in this paper, we propose CoMeT, a new instruction set extension for tagged memory. The key idea behind CoMeT is not only to check whether the tag values in the address tag and me
APA, Harvard, Vancouver, ISO, and other styles
9

Toymentsev, Sergey. "Russia's Historical Memory: Strict-Security or Hybrid?" Ab Imperio 2013, no. 2 (2013): 336–45. http://dx.doi.org/10.1353/imp.2013.0042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

English, Erin. "New PCMCIA card offers security and memory." Computer Fraud & Security Bulletin 1995, no. 3 (1995): 5–6. http://dx.doi.org/10.1016/0142-0496(95)80128-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Carboni, Roberto, and Daniele Ielmini. "Stochastic Memory Devices for Security and Computing." Advanced Electronic Materials 5, no. 9 (2019): 1900198. http://dx.doi.org/10.1002/aelm.201900198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Chien, Jason. "Meeting the Memory Challenge." New Electronics 54, no. 15 (2021): 18–22. http://dx.doi.org/10.12968/s0047-9624(22)60520-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Harum, Dana Putri, Aminudin Aminudin, and Sofyan Arifianto. "Improvisasi algoritma advanced encryption standard (AES) dengan melakukan pemetaan s-box pada modifikasi mixcolumns." Jurnal Repositor 1, no. 2 (2019): 95. http://dx.doi.org/10.22219/repositor.v1i2.813.

Full text
Abstract:
AbstrakAlgoritma kriptografi merupakan salah satu unsur penting dalam pengamanan data. Berbagai improvisasi pengembangan algoritma telah dilakukan untuk mengoptimalisasikan kemanan proses pertukaran dalam suata jaringan data. Efisiensi performa menjadi salah satu pertimbangan penggunaan algoritma tertentu. AES memiliki keamanan super yang hingga saat ini keamanannya hanya dapat ditembus dengan waktu sekitar tahun dan semilyar processor. Kompleksitas keamanan AES sebanding dengan penggunaan penggunaan memori serta waktu yang dibutuhkan untuk memproses enkripsi dan dekripsi data begitu besar. Pe
APA, Harvard, Vancouver, ISO, and other styles
14

Jagdish Jangid. "Secure Microservice Communication in Optical Networks." Journal of Information Systems Engineering and Management 10, no. 21s (2025): 911–26. https://doi.org/10.52783/jisem.v10i21s.3455.

Full text
Abstract:
As optical network functions increasingly adopt microservice architectures, traditional con- tainer security mechanisms are proving insufficient against sophisticated attacks targeting these critical infrastructure components. This paper introduces a novel framework for securing microser- vice communications in optical networks through the application of Memory Protection Keys (MPK) for enhanced container isolation. Converging containerization technologies with optical networking introduces unique security challenges, particularly in maintaining isolation between sensitive optical control func
APA, Harvard, Vancouver, ISO, and other styles
15

Tahir, Shahzaib, Hasan Tahir, Ruhma Tahir, Muttukrishnan Rajarajan, and Haider Abbas. "Water Is a Viable Data Storage Medium: A Security and Privacy Viewpoint." Electronics 11, no. 5 (2022): 818. http://dx.doi.org/10.3390/electronics11050818.

Full text
Abstract:
The security of IoT devices is a major concern that needs to be addressed for their wide adoption. Users are constantly seeking devices that are faster and capable of holding large amounts of data securely. It is purported that water has memory of its own and the ability to retain memory of the substances that are dissolved into it, even after being substantially and serially diluted. It was also observed in the lab setting that the microscopic pattern of water obtained from the same vessel by different people is unique but can easily distinguish those individuals if the same experiment is exe
APA, Harvard, Vancouver, ISO, and other styles
16

Gordon, Holden, Jack Edmonds, Soroor Ghandali, Wei Yan, Nima Karimian, and Fatemeh Tehranipoor. "Flash-Based Security Primitives: Evolution, Challenges and Future Directions." Cryptography 5, no. 1 (2021): 7. http://dx.doi.org/10.3390/cryptography5010007.

Full text
Abstract:
Over the last two decades, hardware security has gained increasing attention in academia and industry. Flash memory has been given a spotlight in recent years, with the question of whether or not it can prove useful in a security role. Because of inherent process variation in the characteristics of flash memory modules, they can provide a unique fingerprint for a device and have thus been proposed as locations for hardware security primitives. These primitives include physical unclonable functions (PUFs), true random number generators (TRNGs), and integrated circuit (IC) counterfeit detection.
APA, Harvard, Vancouver, ISO, and other styles
17

Yan, Pengbo, and Toby Murray. "SecRSL: security separation logic for C11 release-acquire concurrency." Proceedings of the ACM on Programming Languages 5, OOPSLA (2021): 1–26. http://dx.doi.org/10.1145/3485476.

Full text
Abstract:
We present Security Relaxed Separation Logic (SecRSL), a separation logic for proving information-flow security of C11 programs in the Release-Acquire fragment with relaxed accesses. SecRSL is the first security logic that (1) supports weak-memory reasoning about programs in a high-level language; (2) inherits separation logic’s virtues of compositional, local reasoning about (3) expressive security policies like value-dependent classification. SecRSL is also, to our knowledge, the first security logic developed over an axiomatic memory model. Thus we also present the first definitions of info
APA, Harvard, Vancouver, ISO, and other styles
18

Akdemir, Bayram, and Hasan Üzülmez. "Providing Security of Vital Data for Conventional Microcontroller Applications." Applied Mechanics and Materials 789-790 (September 2015): 1059–66. http://dx.doi.org/10.4028/www.scientific.net/amm.789-790.1059.

Full text
Abstract:
Microcontrollers are widely used in industrial world, and almost all kind of devices were based on microcontroller to achieve high flexibility and abilities. All microcontrollers have nonvolatile and volatile memories to execute the software. During the running, microcontroller calculates many variables and records them to any non-volatile memory to use later. After re-energizing, microcontroller takes the data calculated before the power off and executes the program. In case of any electrical writing error or any power loss during the writing procedure, un-written memory blocks or any un-writ
APA, Harvard, Vancouver, ISO, and other styles
19

Sepúlveda, Johanna, Felix Wilgerodt, and Michael Pehl. "Towards memory integrity and authenticity of multi-processors system-on-chip using physical unclonable functions." it - Information Technology 61, no. 1 (2019): 29–43. http://dx.doi.org/10.1515/itit-2018-0030.

Full text
Abstract:
Abstract A persistent problem for modern Multi-Processors System-on-Chip (MPSoCs) is their vulnerability to code injection attacks. By tampering the memory content, attackers are able to extract secrets from the MPSoC and to modify or deny the MPSoC’s operation. This work proposes SEPUFSoC (Secure PUF-based SoC), a novel flexible, secure, and fast architecture able to be integrated into any MPSoC. SEPUFSoC prevents execution of unauthorized code as well as data manipulation by ensuring memory integrity and authentication. SEPUFSoC achieves: i) efficiency, through the integration of a fast and
APA, Harvard, Vancouver, ISO, and other styles
20

Rahman, Nashrullah Mujibur, Didik Tristianto, and Slamet Winardi. "Design and Build Security for Opening and Closing a House Fence using a Microcontroller-Based Remote Control." Natural Sciences Engineering and Technology Journal 1, no. 2 (2021): 54–57. http://dx.doi.org/10.37275/nasetjournal.v1i2.10.

Full text
Abstract:
Home security is an inevitable need. The security system on the fence by entering a password on the remote control allows ensuring security. This study aims to design a security system technology that is automated when the homeowner enters a pre-set password/passcode. All of these systems are connected to the ATmega8535 microcontroller which has been programmed using the Code Vision Avr software stored in the ATmega8535 microcontroller memory and supporting memory as a means of storing password data.
APA, Harvard, Vancouver, ISO, and other styles
21

Sevastianova, Yaroslava, and Dmitriy Efremenko. "Securitization of memory and dilemma of mnemonic security." Political Science (RU), no. 2 (2020): 66–86. http://dx.doi.org/10.31249/poln/2020.02.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Davies, Nigel, Adrian Friday, Sarah Clinch, et al. "Security and Privacy Implications of Pervasive Memory Augmentation." IEEE Pervasive Computing 14, no. 1 (2015): 44–53. http://dx.doi.org/10.1109/mprv.2015.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Wang, Xueyan, Jienlei Yang, Yinglin Zhao, Xiaotao Jia, Gang Qu, and Weisheng Zhao. "Hardware Security in Spin-based Computing-in-memory." ACM Journal on Emerging Technologies in Computing Systems 16, no. 4 (2020): 1–18. http://dx.doi.org/10.1145/3397513.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Biswas, Liton Kumar, M. Shafkat M. Khan, Leonidas Lavdas, and Navid Asadizanjani. "Security Assessment of Nonvolatile Memory Against Physical Probing." EDFA Technical Articles 24, no. 4 (2022): 22–29. http://dx.doi.org/10.31399/asm.edfa.2022-4.p022.

Full text
Abstract:
Abstract This article describes how physical attacks can be launched on different types of nonvolatile memory (NVM) cells using failure analysis tools. It explains how the bit information stored inside these devices is susceptible to read-out and fault injection attacks and defines vulnerability parameters to help quantify risks associated with different modalities of attack. It also presents an in-depth security analysis of emerging NVM technologies and discusses potential countermeasures.
APA, Harvard, Vancouver, ISO, and other styles
25

Wu, Jin, and Yi Huai Wang. "Protection Mechanisms and Security Operations of XS128 Flash Memory." Advanced Materials Research 403-408 (November 2011): 1767–71. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.1767.

Full text
Abstract:
In this paper we study the protection mechanisms and security operations of XS128 Flash memory. By introducing the configuration regions in XS128 Flash memory, we elaborate P-FLASH/D-FLASH Protection Mechanisms and protection register FPROT/DFPROT. Besides, we put forward encryption/decryption methods to guarantee the security of MCU.
APA, Harvard, Vancouver, ISO, and other styles
26

Druchek, Olena. "HISTORICAL (NATIONAL) MEMORY POLICY IN THE CONTEXT OF SECURITY PROBLEMS IN UKRAINE." Науковий вісник Київського інституту Національної гвардії України, no. 1 (June 30, 2025): 151–59. https://doi.org/10.59226/2786-6920.1.2025.151-159.

Full text
Abstract:
The article substantiates the importance of studying the problems of historical memory and the politics of historical (national) memory today, during the period of Russia’s armed aggression and information war against Ukraine, the manifestation of which is the transfer of the confrontation into the sphere of public consciousness and collective historical memory. It is proved that the above is due to the role played by historical memory and the policy of historical (national) memory in the processes of national identification, nation-building and state-building, ensuring national security, dete
APA, Harvard, Vancouver, ISO, and other styles
27

Wang, Jian, and Ying Li. "RDAMS: An Efficient Run-Time Approach for Memory Fault and Hardware Trojans Detection." Information 12, no. 4 (2021): 169. http://dx.doi.org/10.3390/info12040169.

Full text
Abstract:
Ensuring the security of IoT devices and chips at runtime has become an urgent task as they have been widely used in human life. Embedded memories are vital components of SoC (System on Chip) in these devices. If they are attacked or incur faults at runtime, it will bring huge losses. In this paper, we propose a run-time detection architecture for memory security (RDAMS) to detect memory threats (fault and Hardware Trojans attack). The architecture consists of a Security Detection Core (SDC) that controls and enforces the detection procedure as a “security brain”, and a memory wrapper (MEM_wra
APA, Harvard, Vancouver, ISO, and other styles
28

Jagiełło-Szostak, Anna. "Links between foreign and security policy and historical memory: the case of Serbia – Kosovo relations." Rocznik Instytutu Europy Środkowo-Wschodniej 18, no. 2 (2020): 59–84. http://dx.doi.org/10.36874/riesw.2020.2.3.

Full text
Abstract:
The article aims to analyse the impact of historical memory on foreign and security policy using the example of the Serbia – Kosovo relations in the period of 2014-2019. Historical memory is a burden, challenge and opportunity for foreign and security policy, and has a considerable impact on bilateral relations between countries which used to be in conflict. Historical memory generates numerous research questions – who is the architect of memory? what are the actors? what are the mechanisms, tools and instruments of its creation? how is it used to maintain power and what are its effects? – to
APA, Harvard, Vancouver, ISO, and other styles
29

Vellanki, Ravi Babu. "PostgreSQL Configuration: Best Practices for Performance and Security." European Journal of Computer Science and Information Technology 13, no. 47 (2025): 172–82. https://doi.org/10.37745/ejcsit.2013/vol13n47172182.

Full text
Abstract:
PostgreSQL configuration significantly impacts database performance and security, yet default settings often prioritize compatibility over optimization. This article presents a comprehensive framework for PostgreSQL configuration, addressing critical aspects including memory allocation, query planning, security hardening, and monitoring. By examining the interdependencies between configuration parameters and their effects on system behavior under various workloads, the article provides a structured approach to database optimization. Memory allocation strategies focus on shared buffers, work me
APA, Harvard, Vancouver, ISO, and other styles
30

JIBIN JOY and Dr. S. Devaraju. "AVOIDANCE OF DUPLICACY AND COMPELLING CLOUD SECURITY INDIFFERENT CLOUD SITUATIONS." INTERNATIONAL JOURNAL OF CREATIVE RESEARCH THOUGHTS 11, no. 11 (2023): a543—a555. http://dx.doi.org/10.56975/1k890v13.

Full text
Abstract:
Data deduplication is necessary for making data smaller and preventing duplication when transferring it. It is often used in cloud computing to increase the amount of data that can be transferred and reduce the amount of memory used. During the deduplication handle, delicate information integrity is safeguarded by means of an encryption approach, sometimes recently being redistributed. The SHA calculation is broadly utilized to store content information. The content is padded to make the security bits. During the deduplication handle, it computes the hash, which consists of hexadecimal, string
APA, Harvard, Vancouver, ISO, and other styles
31

Yahia, Alemami, M. Al-Ghonmein Ali, G. Al-Moghrabi Khaldun, and Afendee Mohamed Mohamad. "Cloud data security and various cryptographic algorithms." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1867–79. https://doi.org/10.11591/ijece.v13i2.pp1867-1879.

Full text
Abstract:
Cloud computing has spread widely among different organizations due to its advantages, such as cost reduction, resource pooling, broad network access, and ease of administration. It increases the abilities of physical resources by optimizing shared use. Clients’ valuable items (data and applications) are moved outside of regulatory supervision in a shared environment where many clients are grouped together. However, this process poses security concerns, such as sensitive information theft and personally identifiable data leakage. Many researchers have contributed to reducing the problem
APA, Harvard, Vancouver, ISO, and other styles
32

Widya Dwi Agustin, A. Dhyta Maulana, Dede Wirta, and Didik Aribowo. "Studi Perbandingan Antara Memori DRAM dan Memori SRAM Dalam Sistem Keamanan Komputer." Jurnal Teknik Mesin, Industri, Elektro dan Informatika 2, no. 4 (2023): 01–10. http://dx.doi.org/10.55606/jtmei.v2i4.2747.

Full text
Abstract:
The ever-evolving digital world has made computer security an increasingly important and urgent issue. Computer security refers to a set of practices, policies and technologies designed to protect computer systems, networks and data from threats such as cyber attacks, data theft and software damage. The purpose of this research is to compare DRAM memory and SRAM memory in computer security systems. This research uses the library research method, which is the collection of information or scientific papers related to literature reviews that are literature. the selection between DRAM and SRAM mus
APA, Harvard, Vancouver, ISO, and other styles
33

Dener, Murat. "Comparison of Encryption Algorithms in Wireless Sensor Networks." ITM Web of Conferences 22 (2018): 01005. http://dx.doi.org/10.1051/itmconf/20182201005.

Full text
Abstract:
In general, Wireless Sensor Networks occur when sensor nodes are randomly left in an unreliable environment. Sensor node has limited processor, limited memory, limited radio capacity and low cost. In sensor network applications, security mechanisms must be used, because of unsafe environments, excessive number of sensor nodes, and wireless communication environments. Ensuring confidentiality, the primary goal of security, is one of the most important problems to be solved in order to realize time and vital objectives. While ensuring security, it is also necessary to consider other important cr
APA, Harvard, Vancouver, ISO, and other styles
34

Mamta Rani. "Database security at cache layer." International Journal of Science and Research Archive 9, no. 2 (2023): 016–19. http://dx.doi.org/10.30574/ijsra.2023.9.2.0506.

Full text
Abstract:
As database security is the main concern, we are going to place an encryption module at the cache layer. All the encryption and decryption will be done at the cache layer before storing that data to the database, which will provide more security to the database Higher level security should be provided to the database so here we are placing an idea of Elliptical Curve Cryptography. A database is a collection of data that helps us to collect, retrieve, organize and manage the data in an efficient and effective manner. Databases are critical assets. They store client details, financial informatio
APA, Harvard, Vancouver, ISO, and other styles
35

Pakhomenko, Sergii, and Olga Sarajeva. "Securitization of Memory: a Theoretical Framework to Study the Latvian Case." Przegląd Strategiczny, no. 13 (December 31, 2020): 395–410. http://dx.doi.org/10.14746/ps.2020.1.24.

Full text
Abstract:
The article suggests and argues a theoretical framework for studying a particular case of memory securitization. It is based on the constructivist perception of security that is systematically framed in the studies of representatives of the Copenhagen School, who consider security as a socially constructed phenomenon and define identity protection to be one of its primary goals.
 Pursuant to this approach, the article presents a correlation between memory and security in at least three aspects. In the first instance, similar to security, collective memory is socially determined. In the se
APA, Harvard, Vancouver, ISO, and other styles
36

Gustafsson, Karl. "International reconciliation on the Internet? Ontological security, attribution and the construction of war memory narratives in Wikipedia." International Relations 34, no. 1 (2019): 3–24. http://dx.doi.org/10.1177/0047117819864410.

Full text
Abstract:
This article explores the Internet’s often touted potential for facilitating reconciliation. It conceptualises Wikipedia as a site for collective memory construction and analyses the Chinese- and Japanese-language entries on the bilaterally contentious Second Sino-Japanese War. It addresses the question of how to make sense of the construction of these online collective memory narratives theoretically. Both historical determinism and instrumentalism – two influential theoretical approaches to collective memory and reconciliation – have great difficulties in fully accounting for this case. Inst
APA, Harvard, Vancouver, ISO, and other styles
37

Al-Ameen, Mahdi Nasrullah, S. M. Taiabul Haque, and Matthew Wright. "Leveraging autobiographical memory for two-factor online authentication." Information & Computer Security 24, no. 4 (2016): 386–99. http://dx.doi.org/10.1108/ics-01-2016-0005.

Full text
Abstract:
Purpose Two-factor authentication is being implemented more broadly to improve security against phishing, shoulder surfing, keyloggers and password guessing attacks. Although passwords serve as the first authentication factor, a common approach to implementing the second factor is sending a one-time code, either via e-mail or text message. The prevalence of smartphones, however, creates security risks in which a stolen phone leads to user’s accounts being accessed. Physical tokens such as RSA’s SecurID create extra burdens for users and cannot be used on many accounts at once. This study aims
APA, Harvard, Vancouver, ISO, and other styles
38

Rimaitė-Beržiūnienė, Viktorija. "Visual Securitization: Commemorating the Partisan War in Lithuanian Foreign and Security Policy." Politologija 106, no. 2 (2022): 11–52. http://dx.doi.org/10.15388/polit.2022.106.1.

Full text
Abstract:
In 2008 and 2014 the Russian-Georgian war, the military conflict in Ukraine, and the annexation of Crimea have had an impact on Lithuanian foreign and security policy. In the context of these events, Lithuania was concerned about the mobilization of conventional security measures, i.e., strengthening its national defense sector. However, the role as well as the impact of “soft” (unconventional) response devices and strategies in the Lithuanian case has still received little academic interest. This paper, using the analysis of visual collective memory practices (monuments), aims to show the lin
APA, Harvard, Vancouver, ISO, and other styles
39

Alemami, Yahia, Ali M. Al-Ghonmein, Khaldun G. Al-Moghrabi, and Mohamad Afendee Mohamed. "Cloud data security and various cryptographic algorithms." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1867. http://dx.doi.org/10.11591/ijece.v13i2.pp1867-1879.

Full text
Abstract:
<p>Cloud computing has spread widely among different organizations due to its advantages, such as cost reduction, resource pooling, broad network access, and ease of administration. It increases the abilities of physical resources by optimizing shared use. Clients’ valuable items (data and applications) are moved outside of regulatory supervision in a shared environment where many clients are grouped together. However, this process poses security concerns, such as sensitive information theft and personally identifiable data leakage. Many researchers have contributed to reducing the probl
APA, Harvard, Vancouver, ISO, and other styles
40

Mufidah, Nada Fajri, and Hilal Hudan Nuha. "Performance and Security Analysis of Lightweight Hash Functions in IoT." Jurnal Informatika: Jurnal Pengembangan IT 9, no. 3 (2024): 264–70. https://doi.org/10.30591/jpit.v9i3.7633.

Full text
Abstract:
The rapid proliferation of Internet of Things (IoT) devices across various sectors, including healthcare, automotive, smart homes, and agriculture, has created a need for robust security measures that do not compromise the limited resources of these devices. This study analyses the performance and security of several lightweight cryptographic hash functions, specifically SHAKE128, BLAKE2s, SHA-256, SHA3-256, SipHash and xxHash, within the context of the Internet of Things (IoT). A series of experiments conducted on the Arduino Uno platform allows for an evaluation of these functions in terms o
APA, Harvard, Vancouver, ISO, and other styles
41

Gustafsson, Karl. "Memory Politics and Ontological Security in Sino-Japanese Relations." Asian Studies Review 38, no. 1 (2013): 71–86. http://dx.doi.org/10.1080/10357823.2013.852156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Iyengar, Anirudh Srikant, Swaroop Ghosh, and Kenneth Ramclam. "Domain Wall Magnets for Embedded Memory and Hardware Security." IEEE Journal on Emerging and Selected Topics in Circuits and Systems 5, no. 1 (2015): 40–50. http://dx.doi.org/10.1109/jetcas.2015.2398232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Mahdi, Hussain. "KERBEROS SECURITY EVALUATION." Diyala Journal of Engineering Sciences 1, no. 1 (2008): 152–63. http://dx.doi.org/10.24237/djes.2008.01111.

Full text
Abstract:
Authentication of a person is an important task in many areas of day-to-day life including electronic commerce, system security and access control. We present Kerberos a client\server authentication protocol which can perform a secure communication over unsecured environments (internet). For example an e-bank application the client can log on in domain environment using password (single factor authentication) or a smart card running java card application in combine with PIN and the server is the banking hosted system at the bank. Smart card can enhance the security by storing the cryptographic
APA, Harvard, Vancouver, ISO, and other styles
44

Alshannaq, Osama, Mohd Rizuan Baharon, Jamil Abedalrahim Jamil Alsayaydeh, et al. "Analysis of the Lowest Memory Consumption (Memory Usage) Through Running Different Cryptography Techniques for Different Types of Images." Journal of Physics: Conference Series 2319, no. 1 (2022): 012027. http://dx.doi.org/10.1088/1742-6596/2319/1/012027.

Full text
Abstract:
Abstract Nowadays security of image communication systems is highly important. It is essential to provide protection for image data confidentiality from illegal users. The detection and identification of unauthorized users is still a difficult and complex task. Many researchers have proposed several works to provide security of the transmission of the image. The objective of this article is to provide a comparative study of the current techniques that have been widely used. This article concentrates on various types of cryptography algorithms that are existing, like AES, MAES, DES, 3DES, RSA,
APA, Harvard, Vancouver, ISO, and other styles
45

Krishna, Prasad K. "Securing the Internet of Things: A Comprehensive Analysis of Lightweight Cryptographic Approaches for Resource-Constrained Devices." International Journal of Information Technology Research Studies (IJITRS) 1, no. 1 (2025): 20–35. https://doi.org/10.5281/zenodo.15309858.

Full text
Abstract:
The rapid proliferation of Internet of Things (IoT) devices has introduced significant security challenges due to their resource constraints and widespread deployment in critical applications. This research examines lightweight cryptographic approaches that can provide robust security for IoT communication while operating within the severe computational, memory, and energy limitations of IoT devices. Through systematic analysis of existing lightweight cryptographic primitives, protocols, and frameworks, this paper identifies the most promising solutions for securing IoT ecosystems. Our finding
APA, Harvard, Vancouver, ISO, and other styles
46

Li, Sijia, Zhiyi Liao, Zhengyang Wu, Zheng Wu, and Lin Ding. "(Quantum) Time-Memory-Data Tradeoff Attacks on the SNOW-V Stream Cipher." Symmetry 14, no. 6 (2022): 1127. http://dx.doi.org/10.3390/sym14061127.

Full text
Abstract:
Symmetric cryptosystems (i.e., stream ciphers and block ciphers) have always played an important part in securing the various generations of 3GPP (3rd Generation Partnership Project) mobile telephony systems. The SNOW-V stream cipher, published in September 2019, is the most recent member of the well-known SNOW family of ciphers. It is designed to provide confidentiality and integrity for 5G communications. There have been no time-memory-data tradeoff (TMDTO) attacks on the cipher published so far. By combining with the BSW sampling technique, we propose TMDTO attacks on SNOW-V. The results sh
APA, Harvard, Vancouver, ISO, and other styles
47

Bonchev, Miroslav. "Atomic Memory Model." Mathematics, Computer Science and Education 7, no. 2 (2024): 83–93. https://doi.org/10.54664/fpky9556.

Full text
Abstract:
Memory leaks and buffer overruns are among the most common erroneous conditions in computer systems. They are also among the most tedious, difficult and time consuming to detect, identify, locate, and resolve. Both Microsoft and Google independently report that memory safety issues cause 70% of all security vulnerabilities [10]. The Atomic Memory Model provides a mechanism for resolving these types of errors. Simultaneously, it makes the software architecture more robust and elegant by enforcing a code hierarchy regarding the memory use, as well as allowing for innate memory abstraction that m
APA, Harvard, Vancouver, ISO, and other styles
48

C. Visalatchi. "Enhancing Network Security in Wireless Sensor Networks through Rsa-Based Secure Memory Management and Optimized Resource Allocation: A Comprehensive Survey." Communications on Applied Nonlinear Analysis 32, no. 9s (2025): 2777–97. https://doi.org/10.52783/cana.v32.4555.

Full text
Abstract:
To improve the safety of networks in Wireless Sensor Networks (WSNs), this study offers a thorough analysis and presents a unique architecture that combines the best utilization of resources with RSA-based secure control of memory. WSNs are essential for many tasks, including weapons systems and tracking the environment, but because of their centralized architecture and shortages of resources, they are very susceptible to breaches of security. This assessment provides a critical analysis of current security mechanisms, emphasizing resource distribution tactics, memory administration approaches
APA, Harvard, Vancouver, ISO, and other styles
49

Elamurugu, V., and D. J. Evanjaline. "DynAuthRoute: Dynamic Security for Wireless Sensor Networks." Indian Journal Of Science And Technology 17, no. 13 (2024): 1323–30. http://dx.doi.org/10.17485/ijst/v17i13.49.

Full text
Abstract:
Objectives: The research aims to design an architecture for secure transmission of data in wireless sensor networks. Methods: The method involves three main pillars: authentication, data encryption, and dynamic routing. Extensive simulations have been conducted to evaluate the suggested method in terms of energy consumption, memory footprint, packet delivery ratio, end-to-end latency, execution time, encryption time, and decryption time. Findings: For authentication, a dynamic key is used to power an improved salt password hashing method. Data encryption is performed using format-preserving en
APA, Harvard, Vancouver, ISO, and other styles
50

Stark, Samuel W., A. Theodore Markettos, and Simon W. Moore. "How Flexible is CXL's Memory Protection?" Queue 21, no. 3 (2023): 54–64. http://dx.doi.org/10.1145/3606014.

Full text
Abstract:
CXL, a new interconnect standard for cache-coherent memory sharing, is becoming a reality - but its security leaves something to be desired. Decentralized capabilities are flexible and resilient against malicious actors, and should be considered while CXL is under active development.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!