Can anyone help me to share what is the current issue of xml excryption, is there any reference I can read?
There exists a plurality of documents in the scientific literature. Let me itemize some recent ones!
https://doi.org/10.1109/ICCPEIC.2016.7557200
https://doi.org/10.1109/GCWCN.2014.7030879
https://doi.org/10.1109/ICRTIT.2013.6844276
Hai, Iam doing experiment about novel compound to induce thermogenesis on 3t3-L1 cells. The beta actin has been adjusted, but when i did western blot and imaging with image J, the result it is...
14 July 2024 3,354 1 View
Hello Professors, Masters, and Students that expertize in remote sensing. I am studying about geological engineering and now starting to practice with remote sensing for geological purposes. Last...
29 July 2019 5,799 4 View
I am building a system, as an evaluation of the system it is necessary to test the CIA aspects of the system.To measure the Confidentiality - Integrity - Availability that has been applied to a...
30 December 2018 1,499 2 View
I am studying ABAC (Attribute Based Access Control), specifically for application in the context of access to digital evidence. Is there a document that gives an overview of step by step how to...
14 January 2018 4,685 2 View
I am performing graphene oxide reduction on SiO2 substrate. In this case, the XPS spectra will measure C1s, O1s and Si2p. Due to the O in SiO2, the O/C ratio cannot be simply calculated from C1s...
08 February 2017 7,404 6 View
If I have a framework as a solution for such a real problem, What is the current method to evaluate the user satisfaction of these solution. Do EUCS (end user computing satisfaction) can be used...
31 May 2016 4,263 5 View
In the case of file digital evidence resulting from the acquisition and imaging of electronic device, is there any metadata standard used to be applied to digital evidence. Are there any similar...
07 March 2016 2,205 2 View
Currently, I'm developing the concept of attribute-based access control (ABAC) model for a digital chain of custody system in law enforcement. How to perform testing of attribute-based access...
27 January 2016 6,290 3 View
If we developed a rural area to become a city, what kind of social impacts should be addressed, both positive or negative impacts? In those areas many people live and their livelihoods depend on...
17 April 2014 9,037 4 View
Sustainable development's goal is to set up three or four types of sustainability, i.e. ecological sustainability, social sustainability, economic sustainability, and institutional sustainability....
09 April 2014 4,864 30 View
i am working on a project on encryption algorithm testing. what is the available simulation tool for testing the effectiveness and accuracy of encryption algorithms
08 June 2024 4,766 1 View
Hello, ReseachGate community! I am contacting the esteemed members of ReseachGate to contribute to valuable research on the Global Cybersecurity Market. Your participation is crucial, and your...
26 May 2024 823 5 View
Guideline to Questions: An Analysis of Data Anonymization Techniques in British Universities This guide provides a general overview of the types of questions I will encounter during the interview....
19 April 2024 4,555 0 View
I am working on the design of an image encryption algorithm. The algorithm has a sound score of entropy, low correlation, resistance to anti-cropping attacks, and resistance to salt and pepper...
20 March 2024 4,006 3 View
I have applied the SHA-256 hash function to the plain image to generate the initial values of the chaotic map in the image encryption algorithm and include it in key space analysis. So, when the...
10 March 2024 8,854 4 View
There are usually two types of methods to deal with and detect deep face forgery. One group uses deep learning to automatically extract important and distinctive features such as eye blink rate,...
08 February 2024 9,154 5 View
Image and text encryption
26 January 2024 1,223 4 View
resource constraint devices (sensor node,RFID tag and smart card)
05 December 2023 8,169 2 View
Integral transforms play an important role in cybersecurity. Complex Integral transforms are used in security encryption, decrypting information and data, analyzing data, and predicting threats.
28 November 2023 4,844 4 View
As part of my master's degree in computer science, I am writing a project on the topic "Evaluation of future requirements for the energy efficiency of post-quantum cryptography (PQC) under...
18 November 2023 548 3 View