Computer Sciences

Algorithm advances uncompromising covert communication

A new algorithm that can enhance covert communication without compromising data integrity is reported in the International Journal of Autonomous and Adaptive Communications Systems.

Security

New CPU vulnerability extends to virtual machine environments

In the area of cloud computing—on-demand access to IT resources via the internet—so-called trusted execution environments (TEEs) play a major role. They are designed to ensure that the data on the virtual work environments ...

Computer Sciences

Cloud data storage security approach taps quantum physics

Distributed cloud storage is a hot topic for security researchers around the globe pursuing secure data storage, and a team in China is now merging quantum physics with mature cryptography and storage techniques to achieve ...

Engineering

New interferometry technique could improve GPS

A new scientific technique could significantly improve the reference frames that millions of people rely upon each day when using GPS navigation services, according to a recently published article in Radio Science.

page 17 from 40

Security

Security is the degree of protection against danger, loss, and criminals.

Security has to be compared and contrasted with other related concepts: Safety, continuity, reliability. The key difference between security and reliability is that security must take into account the actions of people attempting to cause destruction.

This text uses material from Wikipedia, licensed under CC BY-SA