Figure 4 - uploaded by Jaydip Sen
Content may be subject to copyright.
Distributed compliance management. 

Distributed compliance management. 

Source publication
Book
Full-text available
In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integ...

Similar publications

Research
Full-text available
Data security is one of the important aspects of network security so a encryption algorithm is needed to increase data security like DNA Cryptography. DNA cryptography is a fusion of biotech and Computer Science field. This paper mainly focuses on implementation of the DNA cryptosystem with the use of AES and keys management using RSA algorithm and...
Presentation
Full-text available
This publication contains a complete lessons of the course Cryptography and Network Security, which has been provided at Mekelle Institute of Technology. The presentation content covers: 1) Introduction to Internetworking, Security and Cryptography 2) Secret Key Cryptography 3) Public Key Cryptography 4) Hash Function 5) Authentication 6) Network...
Article
Full-text available
Purpose: The current study aims at exploring the theme – wearable devices in healthcare services from 2008 to 2021. It intends to identify the most prominent sources, authors, affiliations, countries, documents, words and trend topics. Methodology: Total 204 records have been extracted from Scopus after applying inclusion and exclusion criteria, an...
Conference Paper
Full-text available
Security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks. RSA algorithm is extensively used in the popular implementations of Public Key Infrastructures. In asymmetric key c...
Preprint
Full-text available
5G made a significant jump in cellular network security by offering enhanced subscriber identity protection and a user-network mutual authentication implementation. However, it still does not fully follow the zero-trust (ZT) requirements, as users need to trust the network, 5G network is not necessarily authenticated in each communication instance,...

Citations

Article
Full-text available
Cyberspace is important to every sphere of human life or operations, including the maritime industry; there is hardly anything that can be done today without the use of cyberspace. Howbeit, it is susceptible to cybercrimes. For this reason, this study appraised the roles of cyber security in the maritime industry, and how the mass media can assist in curbing maritime cybercrimes. Survey Monkey and library methods were used to gather data for the study. For the Survey Monkey method, the questionnaire link was sent through various social media platforms to the respondents made up of seafarers, maritime companies (shore-based) personnel, and selected journalists. Through the library method, guidelines and procedures published by maritime companies like Baltic and International Maritime Council (BIMCO), Cruise Line International Association (CLIA), and International Association of Independent Tanker Owners (INTERTANCO) were analysed. The study was based on the mediamorphosis theory. Findings revealed the different vulnerabilities of maritime systems to cyber-attacks, both on-board and ashore, and also highlighted the steps being taken to address cyber security issues in the maritime domain. Equally, it was discovered that the mass media’s awareness creation level about cyber security in the maritime industry was very low. The study concluded that cyber security plays an important role, not only to the maritime industry but to other sectors as well, as with security in general there must be threats to these systems. Recommendations made include that security agencies and technical experts should cooperate to come up with procedures that will help to mitigate these threats, and that the media carry out intensive awareness campaigns to ensure that both seafarers and personnel at the shore can be aware of the dangers that a cyber-breach poses to the system. Keywords: Cyberspace, Industry, Media, Maritime, Prevention, Security