encrypted communication
Recently Published Documents


TOTAL DOCUMENTS

55
(FIVE YEARS 32)

H-INDEX

4
(FIVE YEARS 1)

2022 ◽  
Author(s):  
Paul E. Smaldino

Identity signals inform receivers of a signaler’s membership in a subset of individuals, and in doing so shape cooperation, conflict, and social learning. Understanding the use and consequences of identity signaling is therefore critical for a complete science of collective human behavior. And, as with all complex social systems, this understanding is aided by the use of formal mathematical and computational models. Here I review some formal models of identity signaling. I divide these models into two categories. The first concerns models that assert how identity functions as a signal and test the consequences of those assertions, with a focus on public health behavior and disease transmission. The second concerns models used to understand how identity signals operate strategically in different social environments, with a focus on covert or encrypted communication.


2021 ◽  
Author(s):  
Juvenal Mendoza-Valencia

The proper use of new technologies, together with a good management of these by the workers, makes the workplace become a melting pot of new ideas, where professional development and motivation [1] make a difference with past and present times where monotonous and repetitive work was the constant. With the use of artificial intelligence, the cloud and big data, a set of intelligent sensors is necessary, which can monitor a critical variable within the production line, which requires an encrypted communication infrastructure and with information that can be monitored in real time, which allows a better performance of the company, making it a more pleasant place for staff and with working conditions that help to overcome them when performing complex tasks. Due to the educational level that many of the workers currently have and the fact of being born in a technified society, it causes them to be more interested in carrying out activities where they develop their creativity and skills, resulting in economic and psychological well-being.


Electronics ◽  
2021 ◽  
Vol 10 (24) ◽  
pp. 3180
Author(s):  
Joonseo Ha ◽  
Heejun Roh

In parallel with the rapid adoption of transport layer security (TLS), malware has utilized the encrypted communication channel provided by TLS to hinder detection from network traffic. To this end, recent research efforts are directed toward malware detection and malware family classification for TLS-encrypted traffic. However, amongst their feature sets, the proposals to utilize the sequential information of each TLS session has not been properly evaluated, especially in the context of malware family classification. In this context, we propose a systematic framework to evaluate the state-of-the-art malware family classification methods for TLS-encrypted traffic in a controlled environment and discuss the advantages and limitations of the methods comprehensively. In particular, our experimental results for the 10 representations and classifier combinations show that the graph-based representation for the sequential information achieves better performance regardless of the evaluated classification algorithms. With our framework and findings, researchers can design better machine learning based classifiers.


2021 ◽  
Vol 17 (2) ◽  
pp. 238-249
Author(s):  
Irhamni Ali

Indonesia is one of the countries that implement Institutional Repositories (IR) in their academic world. According to the National Library of Indonesia, there are more than 7890 academic IR in Indonesia. However, there is no research investigating the institutional repository's security aspect in the Indonesian academic institutional repository.  This paper will explore Indonesian academic IR's security by examining how to secure a connection between the network with encrypted communication to ensure that an intruder does not compromise the relationship between the server and the browser. This research's methodology is conducting experimental on the best institutional repository in Indonesia involving a private and public university. Some serious finding is that most Indonesian Academic Institutional Repositories have vulnerable security issues in their SSL and TLS and can cause a severe problem for their information asset's security in the future. The conclusion is that Indonesian academic institutions' security is not secure, and they need to consider this issue seriously. Create better security intervention for IR with the latest high-quality technology and policy to protect the information asset such as user, administrator, and visitor personal data and valuable digital objects in Indonesian academic IR.


2021 ◽  
Vol 2020 (1) ◽  
pp. 012044
Author(s):  
T L Kao ◽  
H C Wang ◽  
J E Li

2021 ◽  
Author(s):  
Adithya B. ◽  
Santhi G.

Information protection and secrecy are major concerns, especially regarding the internet’s rapid growth and widespread usage. Unauthorized database access is becoming more common and is being combated using a variety of encrypted communication methods, such as encryption and data hiding. DNA cryptography and steganography are used as carriers by utilizing the bio-molecular computing properties that have become more common in recent years. This study examines recently published DNA steganography algorithms, which use DNA to encrypt confidential data transmitted through an insecure communication channel. Several DNA-based steganography strategies will be addressed, with a focus on the algorithm’s advantages and drawbacks. Probability cracking, blindness, double layer of security, and other considerations are used to compare steganography algorithms. This research would help and create more effective and accurate DNA steganography strategies in the future.


TEME ◽  
2021 ◽  
pp. 095
Author(s):  
Darko Trifunović

 Over time, terrorism has evolved into different forms. One of the most dangerous is certainly cyber terrorism. There are many different motivations for terrorists to deploy cyber terrorism as a tool in their fight. Internet and computer networks are powerful resources on which contemporary society relies heavily. Terrorist groups have developed new tools and methods of the fight and they have become more effective, efficient, and unpredictable. Virtual, or cyberspace, is perfect and very safe ground for terrorist groups’ various activities, such are secret encrypted communication, file sharing, indoctrination and recruitment of vulnerable individuals, fundraising and promotions of their future actions and accomplishments spreading fear among common people. Are we adequately aware of these facts and prepared for countermeasures? The fact is that terrorists use mostly open-source tools (software) for their purposes, widely available and free of charge, as well as video games, popular social networks (mostly Twitter), and software developed by their programmers. The purpose of this paper is to point out some of the methods radical Islamic terrorist groups have been using and underline the importance of responding to this new security challenge.


Sign in / Sign up

Export Citation Format

Share Document