بحث بسيط
السجلات المعروضة 1 -- 4 من 4
Empirical performance evaluation of QUIC protocol for Tor anonymity network
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ...
Design and Implementation of a Threat-Specific Security Risk Assessment Tool
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Security threats posed to individual cloud computing clients vary depending on their specific security requirements. However, Cloud Providers apply generic security risk assessment approaches which result do not consider ...
Watermarking: A review of software and hardware techniques
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Watermarking is a well-known technique traditionally used in banknotes and other documents to discourage counterfeiting. It usually consists of semi-transparent symbols embedded on paper. Similar concepts were applied to ...
A Practical Universal Consortium Blockchain Paradigm for Patient Data Portability on the Cloud Utilizing Delegated Identity Management
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
This paper presents a blockchain system that exploits the base modular features of the Hyperledger Fabric framework to allow for a new, patient-centric, practical data portability paradigm. The system empowers patients by ...