Design and implementation of a ring oscillator-based physically unclonable function on field programmable gate array to enhance electronic security
Physically unclonable functions (PUFs) are functions that generate a set of random responses when stimulated by a set of pre-defined challenges. They are mostly used for hardware verification and/or device authentication mechanisms, access control, ...
UML-based process model for mobile cloud forensic application framework - a preliminary study
The mobile cloud forensics has received a great deal of attention within the digital forensics community. Collecting potential evidence from the mobile cloud by applying forensically sound methods faces severe setback due to technological advancements. ...
Design and development of two levels electronic security and safety system for buildings
Today, security is not just a requirement but a necessity. It could be of any place like residences, business installations, educational institutions, etc. The paper present is on electronic security and safety system is doing bit in ridding the society ...
Security efficient command control communication and integration with digital television
In the present work we propose an intelligence C3I concept by integrating public safety radio communication networks and digital television (DTV). Transparent operation achieved through internet protocol (IP) interfaces. Terrestrial DTV will be used as an ...
Problems of legal regulations of relations in the sphere of the electronic document flow
Regulation of the electronic document flow stand as allied form of the legal structure. The document flow contains elements of the general law of regulation and reaffirms the necessity of following specific instructions. Its electronic form gives an ...
An ontological approach to threats pattern collection and classification: a preliminary study to security management
This study presents an agent based approach to resolve issues related to the collection and classification of software application anomalies and misuses with the aim of facilitating the reappraisal of security controls of information system (IS). The ...