Over 15 years we help companies reach their financial and branding goals. GO for SECURITY is a values-driven technology company dedicated.

Gallery

Contacts

746 rue de STRASBOURG.
G1X 3B1, QUÉBEC (QC), CANADA

+1 581-983-2872

Business

A network intrusion detection method based on contrastive learning and Bayesian Gaussian Mixture Model

On one hand, Network Intrusion Detection Systems (NIDS) that are based on machine learning sometimes demand important domain expertise and experimentation. That makes performance be suboptimal in complex network environments. On other hand deep learning although its power can hardly deal with imbalanced data. That results in a bias towards normal traffic and reduced effectiveness […]

Business

An efficient video slice encryption scheme and its application

Applications of multimedia data deal more with security and privacy of video content since they are spreading in cloud computing environments. Encryption methods are limited because even if they can protect video content, they hardly succeed in balancing codec compatibility and security. And when they succeed, they impact video processing speed. To address this issue, […]

Business

An Unsupervised Fake News Detection Framework Based on Structural Contrastive Learning

It is obvious to say that we should fight against fake news. Methods have been developed. Most of them are time consuming since they use large amounts of annotated data, and are mainly supervised. To address this problem, some researchers proposed a novel unsupervised fake news detection framework based on structural contrastive learning by combining […]

Business

Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods

Fully homomorphic encryption (FHE) has experienced significant development and continuous breakthroughs in theory, enabling its widespread application in various fields, like outsourcing computation and secure multi-party computing, in order to preserve privacy. Nonetheless, the application of FHE is constrained by its substantial computing overhead and storage cost. Researchers have proposed practical acceleration solutions to address […]

Business

Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud

However Attribute-based encryption (ABE) scheme supports users to acquire access authorization through collaborative works, it meets its limits when it is necessary to consider the different weights of collaboration users.  Revocable and verifiable weighted attribute-based encryption with collaborative access scheme (RVWABE-CA) may reach this step. Indeed, according to the authors, RVWABE-CA) can provide efficient weighted multi-user […]

Business

Cancelable biometric schemes for Euclidean metric and Cosine metric

The handy biometric data is a double-edged sword, paving the way of the prosperity of biometric authentication systems but bringing the personal privacy concern. To alleviate the concern, various biometric template protection schemes are proposed to protect the biometric template from information leakage. The preponderance of existing proposals is based on Hamming metric, which ignores […]

Business

Confidential computing and related technologies: a critical review

This research critically reviews the definition of confidential computing (CC) and the security comparison of CC with other related technologies by the Confidential Computing Consortium (CCC). We demonstrate that the definitions by CCC are ambiguous, incomplete and even conflicting. We also demonstrate that the security comparison of CC with other technologies is neither scientific nor […]

Business

Reversible data hiding based on histogram and prediction error for sharing secret data

With the advancement of communication technology, a large number of data are constantly transmitted through the internet for various purposes, which are prone to be illegally accessed by third parties. Therefore, securing such data is crucial to protect the transmitted information from falling into the wrong hands. Among data protection schemes, Secret Image Sharing is […]

Business

Reliable personally identifiable information retrieval across multi cloud

Sharing PII is extremely useful in public affairs yet hard to implement due to the worries about privacy violations. Building a PII retrieval service over multi-cloud, which is a modern strategy to make services stable where multiple servers are deployed, seems to be a promising solution. However, three major technical challenges remain to be solved. […]

  • 1
  • 2