1. Foods2012 Ključne besede: food sciences and technology, food chemistry and physical properties, food engineering and production, food security and safety, food toxicology, sensory and food quality, food analysis, functional foods, food and health, food psychology, food and environment Objavljeno v RUNG: 10.05.2024; Ogledov: 948; Prenosov: 2 Povezava na datoteko Gradivo ima več datotek! Več... |
2. Crash course on cybersecurity : a manual for surviving in a networked worldMatej Kovačič, 2022, znanstvena monografija Ključne besede: information security, cybersecurity, network security, passwords, physical security, backup, encryption, data wiping, VPN, anonymization Objavljeno v RUNG: 30.08.2022; Ogledov: 1874; Prenosov: 41 Povezava na celotno besedilo Gradivo ima več datotek! Več... |
3. Analysing security checkpoints for an integrated utility-based information systemSunil K. Muttoo, Rajan Gupta, Saibal K. Pal, 2016, objavljeni znanstveni prispevek na konferenci Opis: With the rising digital medium, the various digital applications are rising too. These applications can work in the private domain or public domain depending upon the environment and features. Of late, the public infrastructure in India is improving and thus digitisation of the services and processes are making it better for the government to function. Lots of new services and applications are planned through desktop-and mobile-based information systems. But any information system requires a good security cover for it to function correctly and efficiently. One such new system was proposed for integrating the various utility systems in Delhi, NCR, for which various security checkpoints are discussed in this paper. These are related to database security, network security, cryptography, and the user authentication process. These checkpoints will be helpful in making the newly proposed information system more secure and will also be helpful in analysing the need and scope of new security features in it. Security concerns are analysed at different levels of the information system and suggestions are made for the system which can be implemented in the currently proposed system. These suggestions can also be used in other similar systems as well as for improving and enhancing security at various levels. Ključne besede: information systems, integrated utility system, database security, network security, data security, information system security, e-governance Objavljeno v RUNG: 15.07.2021; Ogledov: 2795; Prenosov: 11 Povezava na celotno besedilo Gradivo ima več datotek! Več... |
4. Proposed framework for information systems security for e-governance in developing nations : assessment and way ahead for key componentsRajan Gupta, Sunil K. Muttoo, Saibal K. Pal, 2017, objavljeni znanstveni prispevek na konferenci Opis: E-Governance is rising rapidly in various parts of the world. And with rising digitization of the resources, the threats to the infrastructure and digital data is also rising within the government departments. For developed nations, the security parameters and optimization process is well placed but for developing nations like India, the security parameter is yet to be addressed strongly. This study proposes a framework for security assessment amongst E-Governance departments based on Information System principles. The major areas of security to be covered up are towards Hardware, Network, Software, Server, & Data security, Physical Environment Security, and various policies for security of Information Systems at organizational level. Ključne besede: e-governance, information systems security, developing nations, security framework Objavljeno v RUNG: 02.04.2021; Ogledov: 2631; Prenosov: 62 Povezava na celotno besedilo Gradivo ima več datotek! Več... |
5. Development of e-governance in an emerging economy like India : assessment and way ahead for key componentsRajan Gupta, Sunil K. Muttoo, Saibal K. Pal, 2017, objavljeni znanstveni prispevek na konferenci Opis: In this paper, we describe the key research questions handled during the doctoral work done in the area of E-Governance. The five research questions in the study are related to the concepts like Development of E-Governance & its assessment, Infrastructure management to reach out to maximum citizens, Various types of Security concerns faced during the E-Governance Development, Analyzing the E-Governance transaction pattern to capture citizen's interest, and finally the way ahead for the E-Governance development through the route of efficiency and optimization in the service designing. The methodology adopted and results obtained for various research questions are discussed at high level. Some portion of the current work is still in progress. Ključne besede: e-governance, location allocation, common service centers, intrusion detection system, security, analytics Objavljeno v RUNG: 02.04.2021; Ogledov: 2709; Prenosov: 58 Povezava na celotno besedilo Gradivo ima več datotek! Več... |
6. |
7. A novel lightweight encryption scheme for multimedia dataRajan Gupta, Saibal K. Pal, Neeharika Chaudhary, 2014, izvirni znanstveni članek Opis: The usage of Multimedia data has increased by many folds in recent years. And with so many different types of devices available to access the data, it becomes imperative to protect its sanctity. In this paper, a novel lightweight encryption scheme using a secret key has been proposed for multimedia data especially Videos. Chaos based maps has been used to provide an apt level of confusion and diffusion process at different levels of Video Processing. Proposed technique has a high encryption rate and performs well even with the videos with excessive
redundant data. Security Analysis has been performed to validate the high security features against different types of Statistical and Differential attacks and helps to prove the effectiveness of proposed system. Ključne besede: chaotic maps, lightweight schemes, multimedia encryption, security analysis Objavljeno v RUNG: 01.04.2021; Ogledov: 2961; Prenosov: 12 Povezava na celotno besedilo Gradivo ima več datotek! Več... |
8. Efficient and secured video encryption scheme for lightweight devicesRajan Gupta, Neeharika Chaudhary, Anika Garg, Saibal K. Pal, 2014, izvirni znanstveni članek Opis: Technological advancements in the field of multimedia have made access to information effortless. As information is available easily to everyone so it is quite essential to shield secretive data. This paper focuses on encrypting videos using confusion and diffusion at various levels. Chaotic skew tent map and nested piecewise linear chaotic map which are categorized under piecewise linear maps have been used for the processing. Two skew tent maps are cross coupled with each other to generate random values. The binary sequences are generated by comparing the outputs of the cross coupled piecewise linear chaotic maps. The generated binary sequence is used for bit level diffusion. Further, pixels are shuffled to provide higher level of encryption. The ciphered video is of the same size as that of plain video. The proposed scheme is of low complexity and provides high level encryption. The security analysis of the technique has been carried out and better results have been found regarding the statistical and differential attacks. The code development has been done in MATLAB and the scheme is applicable in areas like Video Encryption, Steganography and Digital Watermarking on various lightweight devices. Ključne besede: video processing, multimedia encryption, chaotic maps, lightweight device security Objavljeno v RUNG: 01.04.2021; Ogledov: 2760; Prenosov: 0 Gradivo ima več datotek! Več... |
9. Design and analysis of new shuffle encryption schemes for multimediaRajan Gupta, Ankur Aggarwal, Saibal K. Pal, 2012, izvirni znanstveni članek Opis: Securing the contents of visual data and multimedia requires specific design consideration for use in different applications. The major issue with this type of data has been occurrence of redundancy, at various places particularly in images, which makes data values repetitive at several places. The focus of this paper is on design of new shuffling schemes that can efficiently destroy redundancy in the visual data ensuring its secured transmission and distribution over public networks. Different variants of these shuffling schemes will be used as pre-processing schemes on multimedia data values especially in light weight devices using images. Standard as well as chaotic permutation and substitution schemes together with S-box rotation have been used to shuffle and map the plain data into random uncorrelated values via various variants of the presented schemes. For further improving the security, the processed data is encrypted using a computationally fast algorithm in its normal mode of operation. Security analysis using different types of images show that the proposed schemes satisfy the parameters required for securing visual contents even with very high redundancy. Ključne besede: multimedia security, shuffle, S-box, chaotic encryption, security analysis Objavljeno v RUNG: 01.04.2021; Ogledov: 2757; Prenosov: 0 Gradivo ima več datotek! Več... |
10. Cyber security assessment education for e-governance systemsRajan Gupta, Saibal K. Pal, Sunil K. Muttoo, 2020, samostojni znanstveni sestavek ali poglavje v monografski publikaciji Opis: Electronic Governance is being rapidly adopted across the world for providing seamless services to citizens. With rising digitization of information resources, the threats to the infrastructure and digital data are also growing. For developed nations, the security parameters and optimization processes are well tested and placed, but for developing nations these are yet to be addressed strongly. There is also a need for imparting awareness and educating personnel involved in the development and operations of E-Governance Systems.
This study proposes a framework for security assessment amongst the departments of E-Governance, based on Information Systems principles. The major areas of security covered in the framework are related to the Hardware, Network, Software, Server & Data security, Physical Environment Security, and various policies for security of Information Systems at the organizational level. The suggestive framework has also been tested for an organization in India. It was found that, given the functionality & magnitude of the organization, the assessment framework was able to analyze the strength and weakness of an organization in an exhaustive manner. The coverage of technological and organizational measure was found to be 69% and 53% respectively and the organization was placed in top two zones of the proposed grid. This study will be useful for security assessment of various organizations operating under E-Governance. Ključne besede: e-governance, cyber security education, information systems security, developing nations, security framework Objavljeno v RUNG: 31.03.2021; Ogledov: 2844; Prenosov: 13 Povezava na celotno besedilo Gradivo ima več datotek! Več... |