Web-based third-party architectures for data publishing are today receiving growing attention, due to their scalability and the ability to efficiently manage large numbers of use...
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Abstract. Existing navigation services, such as GPS, offer no signalintegrity (anti-spoof) protection for the general public, especially not with systems for remote attestation of...
We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is no...
Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone...
Abstract. Authentication watermarking is a hidden data inserted into an image, in order to detect any alterations. It seems to be almost impossible to design a really secure authen...