skip to main content
Volume 12, Issue 32020
Publisher:
  • Inderscience Publishers
  • World Trade Center Bldg, 29, route de Pre-Bois, Case Postale 896
  • Geneva 15
  • Switzerland
ISSN:1751-911X
EISSN:1751-9128
Reflects downloads up to 24 Jan 2025Bibliometrics
Skip Table Of Content Section
research-article
Design and implementation of a ring oscillator-based physically unclonable function on field programmable gate array to enhance electronic security

Physically unclonable functions (PUFs) are functions that generate a set of random responses when stimulated by a set of pre-defined challenges. They are mostly used for hardware verification and/or device authentication mechanisms, access control, ...

research-article
UML-based process model for mobile cloud forensic application framework - a preliminary study

The mobile cloud forensics has received a great deal of attention within the digital forensics community. Collecting potential evidence from the mobile cloud by applying forensically sound methods faces severe setback due to technological advancements. ...

research-article
Design and development of two levels electronic security and safety system for buildings

Today, security is not just a requirement but a necessity. It could be of any place like residences, business installations, educational institutions, etc. The paper present is on electronic security and safety system is doing bit in ridding the society ...

research-article
Security efficient command control communication and integration with digital television

In the present work we propose an intelligence C3I concept by integrating public safety radio communication networks and digital television (DTV). Transparent operation achieved through internet protocol (IP) interfaces. Terrestrial DTV will be used as an ...

research-article
Problems of legal regulations of relations in the sphere of the electronic document flow

Regulation of the electronic document flow stand as allied form of the legal structure. The document flow contains elements of the general law of regulation and reaffirms the necessity of following specific instructions. Its electronic form gives an ...

research-article
An ontological approach to threats pattern collection and classification: a preliminary study to security management

This study presents an agent based approach to resolve issues related to the collection and classification of software application anomalies and misuses with the aim of facilitating the reappraisal of security controls of information system (IS). The ...

Comments