Latest Communications of International Proceedings articles

16
Dec
2021

A Cloud Holistic Cyber Security Approach Based on Chaos Theory

Cybersecurity, Privacy & Cryptography: 38SPC 2021
Computational technology has radically changed the way we solve tasks in all areas of industry, education, health and daily activities. Organizations have become the target of increasingly sophisticated cyber-attacks, although the emphasis on cybersecurity has grown, with a focus on personnel, technology and finance. The…
16
Dec
2021

Identity Verification Using Combined Biometric Signature Comparison Algorithms

Cybersecurity, Privacy & Cryptography: 38SPC 2021
This paper describes a method for verifying a person's identity based on their biometric signature. As part of our work, we collected the most important publications of the last years in this area and then attempted to implement and run them on real data. We…
16
Dec
2021

Awareness of Cybercrime – The Need to Be Up to Date

Cybersecurity, Privacy & Cryptography: 38SPC 2021
Social engineering attacks are possibly one of the most dangerous forms of security and privacy attacks since they are technically oriented to non-technical manipulation. There is much easier to exploit the weakest layer of information security systems, which is human factor, than discovering backdoors or…
16
Dec
2021

Cybersecurity Mechanisms in an IT System Using PostgreSQL

Cybersecurity, Privacy & Cryptography: 38SPC 2021
The paper presents the basic legal regulations concerning such a system in the EU and their implementation in Poland. Documents were analysed for entities that use IT systems to send, store and analyse data both for their own business and for handling tasks related to…
16
Dec
2021

Simple Methods for Detecting Fake Signatures Among Biometric Signatures

Cybersecurity, Privacy & Cryptography: 38SPC 2021
The paper describes methods for detecting fake, unproperly created signatures collected by Signatures-gathering Person (SGP). The signatures were collected by a group of about 250 SGPs, who aimed to collect samples of 12 biometric signatures each from 110,000 people. Unfortunately, among them there were some…
16
Dec
2021

A new 2-of-2 Multisignature for Cryptocurrency

Cybersecurity, Privacy & Cryptography: 38SPC 2021
In this paper we construct and consider a new group-based 2-of-2 multisignature scheme, which is built using a bilinear map. This map is an asymmetric pairing of Type 3, and although, for the reason of this paper, it is treated in a completely abstract fashion…
15
Dec
2021

Solving Adaptive Security Architecture with SOAR

Cybersecurity, Privacy & Cryptography: 38SPC 2021
Reducing the time that it takes to handle a cyber security incident is the pain point for specialists all around the world. In this short paper we showcase, how companies can enable their security analysts using SOAR (Security Orchestration and Response) type of product and…
15
Dec
2021

COVID-19 Pandemic’s Impact on Company Activities in Romania

Impact of COVID-19 Pandemic on Organizational Management: COVID38MGT 2021
This paper aims at analyzing the way of action of the Romanian entrepreneurs in the context of the COVID 19 pandemic, their reactions and ways of adapting to the current market. The research is a qualitative one conducted on a group of 10 entrepreneurs. The…
15
Dec
2021

Augmented Reality in Business Marketing. A Systematic Review of Literature from 2016 – 2021

Modern Marketing, Brand Perception and Consumer Insights: 38MKT 2021
Technology in today's world has been constantly developing and even every different day a replacement technology is presented to people. They are largely new tools. Augmented reality is one of these technological advances, which will benefit in many areas [1]. That is why the importance…
15
Dec
2021

Increasing The Efficiency for Transport Problems in A Pandemic Context

Impact of COVID-19 Pandemic on Organizational Management: COVID38MGT 2021
The present paper aims to study the important characteristics of the Transportation Problem, highlighting the aspects that can be processed using elements of Graph Theory (i.e., assignment problems, optimal route), to optimize the transport in pandemic conditions, considering the minimum length of the road that…