EdDSA is a standardised elliptic curve digital signature scheme introduc...
With the advent of digital communication, securing digital images during...
Crypto-ransomware remains a significant threat to governments and compan...
Since 2016, NIST has been assessing lightweight encryption methods, and,...
A fish farm is an area where fish raise and bred for food. Fish farm
env...
Content-based file matching has been widely deployed for decades, largel...
In the past, citizen identity has been used within siloed data areas, an...
With the advancement in technology, digital images can easily be transmi...
Ransomware is a malicious class of software that utilises encryption to
...
E-governance is a process that aims to enhance a government's ability to...
Ransomware has become an increasingly popular type of malware across the...
It was found when reviewing the ransomware detection research literature...
Lightweight cryptography is a novel diversion from conventional cryptogr...
The COVID-19 pandemic has recently emerged as a worldwide health emergen...
Threat information sharing is considered as one of the proactive defensi...
The spread of COVID-19 has highlighted the need for a robust contact tra...
Digital vaccine passports are one of the main solutions which would allo...
Little or no research has been directed to analysis and researching fore...
The continuously advancing digitization has provided answers to the
bure...
Side-channel attacks are an unpredictable risk factor in cryptography.
T...
The threat from ransomware continues to grow both in the number of affec...
As the internet continues to be populated with new devices and emerging
...
A common privacy issue in traditional machine learning is that data need...
In recent years, there has been a massive increase in the amount of Inte...
Memory was captured from a system infected by ransomware and its content...
Electronic health record (EHR) management systems require the adoption o...
The outbreak of viruses have necessitated contact tracing and infection
...
The growing trend of sharing news/contents, through social media platfor...
The proof-of-work consensus protocol suffers from two main limitations: ...
The Domain Name System (DNS) was created to resolve the IP addresses of ...
A distributed and transparent ledger system is considered for various
e-...
A substantial administrative burden is placed on healthcare professional...
When training a machine learning model, it is standard procedure for the...
The fast probabilistic consensus (FPC) is a voting consensus protocol th...
Phishing is considered to be one of the most prevalent cyber-attacks bec...
Bluetooth is a short-range wireless technology that provides audio and d...
Port Knocking is a method for authenticating clients through a closed st...
We increasingly live in a world where there is a balance between the rig...
Malware writers frequently try to hide the activities of their agents wi...
There can be performance and vulnerability concerns with block ciphers, ...
In this paper we present an open source, fully asynchronous, leaderless
...
One major problem with cyberbullying research is the lack of data, since...
Decrypting and inspecting encrypted malicious communications may assist ...
Stricter data protection regulations and the poor application of privacy...
The increasing use of encrypted data within file storage and in network
...
Insider threats continue to present a major challenge for the informatio...