Unsupervised Blockchain for Safeguarding Confidential Information in Vehicle Assets Transfer

Author(s):  
S. Velliangiri ◽  
G.Krishna Lava Kumar ◽  
P. Karthikeyan
2020 ◽  
Vol 24 (3) ◽  
pp. 363-388
Author(s):  
Philippe Kuhn

This article addresses monetary remedies in employment team move and misuse of confidential information cases. It argues that, after the Supreme Court's decision in One Step (Support) Ltd v Morris-Garner, negotiating (previously Wrotham Park) damages offer a useful additional compensatory tool in misuse of confidential information cases. They can help overcome some of the difficulties with ordinary contractual damages, equitable remedies for breach of fiduciary duty and confidence and limitations in injunctive relief. While One Step is restrictive overall, there is a real role for negotiating damages in employment cases where misuse of confidential information is the sole or predominant breach of contract. The well-established Faccenda approach is suggested for identifying the requisite confidential information.


Author(s):  
Satvir Singh

Steganography is the special art of hidding important and confidential information in appropriate multimedia carrier. It also restrict the detection of  hidden messages. In this paper we proposes steganographic method based on dct and entropy thresholding technique. The steganographic algorithm uses random function in order to select block of the image where the elements of the binary sequence of a secret message will be inserted. Insertion takes place at the lower frequency  AC coefficients of the  block. Before we insert the secret  message. Image under goes dc transformations after insertion of the secret message we apply inverse dc transformations. Secret message will only be inserted into a particular block if  entropy value of that particular block is greater then threshold value of the entropy and if block is selected by the random function. In  Experimental work we calculated the peak signal to noise ratio(PSNR), Absolute difference , Relative entropy. Proposed algorithm give high value of PSNR  and low value of Absolute difference which clearly indicate level of distortion in image due to insertion of secret message is reduced. Also value of  relative entropy is close to zero which clearly indicate proposed algorithm is sufficiently secure. 


Author(s):  
Вера Шумилина ◽  
Vera Shumilina ◽  
Юлия Коптева ◽  
Yulia Kopteva ◽  
Сатине Тевосян ◽  
...  

The authors disclose the basic concepts of this topic, prove the relevance, consider the types of threats to confidential information and methods of protection, both legal and organizational, presented an algorithm for creating a system for protecting confidential information.


Author(s):  
Joseph K. Tanimura ◽  
Eric W. Wehrly

According to many business publications, firms that experience information security breaches suffer substantial reputational penalties. This paper examines incidents in which confidential information, for a firms customers or employees, is stolen from or lost by publicly traded companies. Firms that experience such breaches suffer statistically significant losses in the market value of their equity. On the whole, the data indicate that these losses are of similar magnitudes to the direct costs. Thus, direct costs, and not reputational penalties, are the primary deterrents to information security breaches. Contrary to many published assertions, on average, firms that lose customer information do not suffer reputational penalties. However, when firms lose employee information, we find significant reputational penalties.


1987 ◽  
Vol 14 (2) ◽  
pp. 161-172
Author(s):  
Gary S. Marx ◽  
Jonathan D. Strum

2013 ◽  
Vol 443 ◽  
pp. 425-429
Author(s):  
Jing Shuang Lu ◽  
Chun Mei Du ◽  
Xin Guo ◽  
Lei Zhang

This essay describes a new radio encryption technique among communication equipments, that is embed confidential information in normal carrier by using digital watermarking to achieve the purpose of protecting confidential information and confusing illegal interceptors. Meanwhile it also gives embed watermarking based on integration and Detection Algorithm.


2021 ◽  
Vol 12 (4) ◽  
pp. 43-63
Author(s):  
Sorinel Căpuşneanu ◽  
Melinda Timea Fülöp ◽  
Dan Ioan Topor ◽  
Nicoleta Magdalena Iacob ◽  
Alina Georgiana Solomon ◽  
...  

Securing confidential information on mobile platforms has been, is, and will be a topical issue for specialists. In order to eliminate these vulnerabilities, specialized companies have made some patches, but these do not constitute a real guarantee that the same or any other applications will not be attacked and exploited without the users' will. Mitigating these attacks on smartphones can be achieved by securing mobile phones from both users and mobile providers. This article proposes the development of a chat application on the Android platform as a solution to ensure the security of digital data that is transferred through the available communication platforms. When designing this mobile application, the sudden increase in the number of users was taken into account so that the application is stable and creates a pleasant experience for them.


Author(s):  
Abdul Razaque ◽  
Bakhytzhan Valiyev ◽  
Bandar Alotaibi ◽  
Munif Alotaibi ◽  
Saule Amanzholova ◽  
...  

The Dark Web is known as a place triggering a variety of criminal activities. Anonymization techniques enable illegal operations, leading to the loss of confidential information and its further use as bait, a trade product or even a crime tool. Despite technical progress, there is still not enough awareness of the Dark Web and its secret activity. In this study, we introduced the Dark Web Enhanced Analysis (DWEA), in order to analyze and gather information about the content accessed on the Dark Net based on data characteristics. The research was performed to identify how the Dark Web has been influenced by recent global events, such as the COVID-19 epidemic. The research included the usage of a crawler, which scans the network and collects data for further analysis with machine learning. The result of this work determines the influence of the COVID-19 epidemic on the Dark Net.


Sign in / Sign up

Export Citation Format

Share Document