Download PDFOpen PDF in browser

A Survey of Digital Security in Applications and Networking

12 pagesPublished: March 21, 2024

Abstract

From the time the Internet was invented to now, security standards have changed dras- tically. Security risks are not only applicable to businesses but also has spilled over into the government and personal realm as well. Newly created threats are being created every day and mitigation techniques need to be capable of being changed in a moment’s notice. Cybersecurity is an environment in which one must adapt to changes or else they will lose. Keyphrases: SHA, RSA, public key, private key, asymmetric key, plaintext, digital sig- nature, security.

Keyphrases: asymmetric key, digital signature, private key, public key, rsa, security, sha

In: Ajay Bandi, Mohammad Hossain and Ying Jin (editors). Proceedings of 39th International Conference on Computers and Their Applications, vol 98, pages 77-88.

BibTeX entry
@inproceedings{CATA2024:Survey_Digital_Security_Applications,
  author    = {Dylan Damiano and Isabella Mitchell Wynter and Emdad Ahmed},
  title     = {A Survey of Digital Security in Applications and Networking},
  booktitle = {Proceedings of 39th International Conference on Computers and Their Applications},
  editor    = {Ajay Bandi and Mohammad Hossain and Ying Jin},
  series    = {EPiC Series in Computing},
  volume    = {98},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/2Gmk},
  doi       = {10.29007/r7wj},
  pages     = {77-88},
  year      = {2024}}
Download PDFOpen PDF in browser