OXIESEC PANEL
- Current Dir:
/
/
var
/
www
/
accjournal
Server IP: 10.0.0.4
Upload:
Create Dir:
Name
Size
Modified
Perms
π
..
-
02/18/2024 06:33:29 AM
rwxr-xr-x
π
about.php
2.42 KB
02/08/2022 02:27:36 PM
rw-r--r--
π
accjournal
-
12/26/2021 06:46:23 AM
rwxr-xr-x
π
cms
-
02/06/2022 09:24:57 AM
rwxr-xr-x
π
contact.php
1.6 KB
02/08/2022 02:27:36 PM
rw-r--r--
π
contributors.php
3.21 KB
02/08/2022 02:27:36 PM
rw-r--r--
π
data
-
07/17/2025 12:14:38 PM
rwxrwxrwx
π
editor.desk.php
4.17 KB
02/08/2022 02:27:36 PM
rw-r--r--
π
editorial.php
5.39 KB
07/15/2022 06:28:48 AM
rw-r--r--
π
grfx
-
02/06/2022 09:24:57 AM
rwxr-xr-x
π
inc
-
05/19/2022 07:20:39 AM
rwxr-xr-x
π
index.php
1.29 KB
05/13/2022 10:55:12 AM
rw-r--r--
π
list.articles.php
4.28 KB
02/08/2022 02:27:36 PM
rw-r--r--
π
list.authors.php
2.94 KB
02/08/2022 02:27:36 PM
rw-r--r--
π
list.categories.php
2.45 KB
02/08/2022 02:27:36 PM
rw-r--r--
π
list.volumes.php
3.6 KB
02/08/2022 02:27:36 PM
rw-r--r--
π
puzzle.corner.php
987 bytes
02/08/2022 02:27:36 PM
rw-r--r--
π
search.php
3.51 KB
05/20/2022 10:53:27 AM
rw-r--r--
π
show.article.php
3.32 KB
02/08/2022 02:27:36 PM
rw-r--r--
π
show.author.php
3.38 KB
02/08/2022 02:27:36 PM
rw-r--r--
π
show.category.php
2.89 KB
02/08/2022 02:27:36 PM
rw-r--r--
π
show.issue.php
3.87 KB
05/19/2022 06:18:04 AM
rw-r--r--
π
show.topic.php
3.31 KB
05/20/2022 10:53:50 AM
rw-r--r--
π
show.volume.php
2.65 KB
02/08/2022 02:27:36 PM
rw-r--r--
π
z_editorial.php
4.01 KB
02/08/2022 02:27:36 PM
rw-r--r--
Editing: editor.desk.php
Close
<!DOCTYPE html> <html> <head> <title>A Quarterly Publication of ACCS</title> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <script src="inc/jquery-3.6.0.min.js"></script> <script src="inc/bootstrap.min.js"></script> <script src="inc/moment.min.js"></script> <script src="inc/common.js"></script> <link rel="stylesheet" type="text/css" href="inc/bootstrap.min.css" /> <link rel="stylesheet" type="text/css" href="inc/fontawesome/css/all.min.css" /> <link rel="stylesheet" type="text/css" href="inc/style.css" /> </head> <body> <? include 'inc/config.php' ?> <? include 'inc/header.php' ?> <div class="container"> <div class="row"> <div class="col-12 col-md-8"> <div class="txtMedium txtBlue mb-2 py-2">From Editor's Desk</div> The protection of huge amount of information gathered from the vast amount of data traversing across todayβs networked world is a topic of great concern for those involved in information security. Personal information is often shared by people readily without giving a thought on possibility of it being abused. In India, the government agencies also collect alot of data with no guarantee as to its protection. As the author mentions in his article titled βCan a Faradayβs Cage in Todayβs Digital Age Safeguard Our Privacy?β, India witnesses a high incidence of data breaches as no safe and assured data security practices for both online and offline transactions exist. Worldwide, the current system for data protection is non-standardised with divergent regulatory approaches being followed by many countries. The author concludes that there is a need for raising awareness among those interacting with modern day digital technologies.<br><br> Designing a secure device is a challenge because security threats can arise in multiple layers. Vulnerabilities can arise due to bad software design, while others may be created by the use of unsafe programming languages. A significant portion of these vulnerabilities stem from illegal use of memory pointers; for instance, using a memory pointer beyond its permissible memory range.<br><br> In their paper titled βSecurity in Shaktiβ the author discusses how various aspects have been addressed in the implementation of a processor named Shakti. The paper shows how software vulnerabilities arising due to illegal use of memory can be addressed by hardware enhancements and how to make inferring secrets from the side-channel traces difficult. It also explains how in the hardware, power attacks can be mitigated by obfuscating the data in data path, thus breaking the correlation with power consumption. The authors conclude that outside the processor, security measures such as trusted boot and physically unclonable functions would further secure the processor.<br><br> In their survey paper titled βFronthaul Design in Cloud Radio Access Networks: A Surveyβ, exhaustive literature is presented by the authors on the advantages offered by C-RAN architecture. Traditional RAN has drawbacks such as lack of resource sharing and inefficient utilization of the BS as it is working all the time irrespective of load conditions, etc. They bring out the differences between traditional RAN and C-RAN architecture. To get maximum advantages, different C-RAN architectures and Fronthaul architectures were proposed. Fronthaul compression is crucial for bringing sustainability to C-RAN architecture. The authors conclude that, there is a need for the design of more robust network information theoretic compression techniques to make C-RAN a feasible network architecture.<br><br> Finally, in continuation of a series of tutorial articles on Experiential learning, the authors delve into socket programming, which is at the heart of managing TCP connections, and examine the key role that it plays in delivering high performance.<br><br> I am sure that all our readers would find the four articles in this issue very useful, interesting and worth reading.<br><br> Hereβs wishing you all a wonderful year ahead.<br> </div> <div class="col-12 col-md-4"> <? include 'inc/side.php' ?> </div> </div> </div> <? include 'inc/footer.php' ?> </body> </html>