Search

Journal Menu

Journal Browser

Results (5)

Search Parameters:

Section: cyc
Order results
Results per page
Open AccessArticle
7 Pages, 468 KB Download PDF
Secure Anonymous Acknowledgments in a Delay-Tolerant Network

by Edoardo Biagioni
Journal of Engineering Research and Sciences, Volume 3, Issue 11, Page # 24-30, 2024; DOI: 10.55708/js0311002
Abstract: TCP and many other protocols use acknowledgments to provide reliable transmission of data over unreliable media. Secure acknowledgments offer a cryptographic guarantee that valid acknowledgments for a given message can only be issued by the intended receiver. In the context of an ad-hoc network, anonymous acknowledgments make it hard for an attacker to determine which… Read More

(This article belongs to the Special Issue on SP5 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2024) and the Section Cybernetics – Computer Science (CYC))

Open AccessArticle
35 Pages, 3,100 KB Download PDF
Fingerprint Bio-metric: Confronting Challenges, Embracing Evolution, and Extending Utility – A Review

by Diptadip Maiti, Madhuchhanda Basak and Debashis Das
Journal of Engineering Research and Sciences, Volume 3, Issue 9, Page # 26-60, 2024; DOI: 10.55708/js0309003
Abstract: As documented in recent research, this review offers a thorough examination of the intricate subject of fingerprint authentication, including a wide range of issues and applications. Addressing problems like non-linear deformations and enhancing picture quality, which are frequently reduced by sophisticated improvement and alignment techniques are important components of fingerprint image authentication. Countering security concerns… Read More

(This article belongs to the Special Issue on SP5 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2024) and the Section Cybernetics – Computer Science (CYC))

Open AccessArticle
9 Pages, 3,377 KB Download PDF
Browser-in-the-Browser (BitB) Attack: Case Study

by Khalid Alissa, Bushra Alhetela, Ghadeer Alazman, Asma Bader, Noor Alhomeed, Layan Almubarak and Fajer Almulla
Journal of Engineering Research and Sciences, Volume 3, Issue 5, Page # 14-22, 2024; DOI: 10.55708/js0305002
Abstract: Phishing attacks are becoming more sophisticated daily, taking advantage of victims' lack of awareness to steal sensitive information. The browser-in-the-browser (BitB) attack is a novel and sophisticated phishing technique that uses a single sign-on (SSO) popup window that mimics a legitimate browser login to steal a user's credentials. In addition, an attacker can customize the… Read More

(This article belongs to the Section Cybernetics – Computer Science (CYC))

Open AccessArticle
6 Pages, 1,924 KB Download PDF
Histogram Based Visible Image Encryption for Real Time Applications

by Kiran, Sunil Kumar D S, Bharath K N, Harshitha Rohith, Sharath Kumar A J and Ganesh Kumar M T
Journal of Engineering Research and Sciences, Volume 1, Issue 7, Page # 1-6, 2022; DOI: 10.55708/js0107001
Abstract: Like most patient information, medical imaging data is subject to strict data protection and confidentiality requirements. This raises the issue of sending the data which contains a medical image on an open network as per the above issue, also there might be a leakage of information. Encrypting an Image and hiding the information in it… Read More

(This article belongs to the Section Cybernetics – Computer Science (CYC))

Open AccessArticle
10 Pages Download PDF
Blockchain Based Framework for Securing Students’ Records

by Omega Sarjiyus and Israel Isaiah
Journal of Engineering Research and Sciences, Volume 1, Issue 6, Page # 45-54, 2022; DOI: 10.55708/js0106006
Abstract: Right now, colleges, as focuses of exploration and development, coordinate in their cycles different advances that permit further developing administrations and cycles for their individuals. Among the inventive innovations is the Web of Things that permits getting information from the climate and individuals through various gadgets. Security of information on college grounds is expected to… Read More

(This article belongs to the Section Cybernetics – Computer Science (CYC))

Share Link