Over 15 years we help companies reach their financial and branding goals. GO for SECURITY is a values-driven technology company dedicated.

Gallery

Contacts

746 rue de STRASBOURG.
G1X 3B1, QUÉBEC (QC), CANADA

+1 581-983-2872

Business

Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods

Fully homomorphic encryption (FHE) has experienced significant development and continuous breakthroughs in theory, enabling its widespread application in various fields, like outsourcing computation and secure multi-party computing, in order to preserve privacy. Nonetheless, the application of FHE is constrained by its substantial computing overhead and storage cost. Researchers have proposed practical acceleration solutions to address […]

Business

Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud

However Attribute-based encryption (ABE) scheme supports users to acquire access authorization through collaborative works, it meets its limits when it is necessary to consider the different weights of collaboration users.  Revocable and verifiable weighted attribute-based encryption with collaborative access scheme (RVWABE-CA) may reach this step. Indeed, according to the authors, RVWABE-CA) can provide efficient weighted multi-user […]

Business

Cancelable biometric schemes for Euclidean metric and Cosine metric

The handy biometric data is a double-edged sword, paving the way of the prosperity of biometric authentication systems but bringing the personal privacy concern. To alleviate the concern, various biometric template protection schemes are proposed to protect the biometric template from information leakage. The preponderance of existing proposals is based on Hamming metric, which ignores […]

Business

Confidential computing and related technologies: a critical review

This research critically reviews the definition of confidential computing (CC) and the security comparison of CC with other related technologies by the Confidential Computing Consortium (CCC). We demonstrate that the definitions by CCC are ambiguous, incomplete and even conflicting. We also demonstrate that the security comparison of CC with other technologies is neither scientific nor […]

Business

Reversible data hiding based on histogram and prediction error for sharing secret data

With the advancement of communication technology, a large number of data are constantly transmitted through the internet for various purposes, which are prone to be illegally accessed by third parties. Therefore, securing such data is crucial to protect the transmitted information from falling into the wrong hands. Among data protection schemes, Secret Image Sharing is […]

Business

Reliable personally identifiable information retrieval across multi cloud

Sharing PII is extremely useful in public affairs yet hard to implement due to the worries about privacy violations. Building a PII retrieval service over multi-cloud, which is a modern strategy to make services stable where multiple servers are deployed, seems to be a promising solution. However, three major technical challenges remain to be solved. […]

Business

Negotiation and Cyber Security: What Place for Culture?

Some authors describe Negotiation as a zero-sum transaction, meaning that a gain for one party results in only a loss for the other party. However, for Mahmoodi (2012), the negotiation actually ends with one of four possible outcomes: Loser-Loser, Winner-Loser, Winner-Winner, or No result. And the outcome depends on the objectives of the negotiators. Culture […]

Business
what is cybersecurity

COVID-19 and cybersecurity: towards more automation of cybersecurity processes?

Covid 19 surprised the world, didn’t it? The economic consequences have been severe for many individuals and companies. We, SIDIBE GROUP, would like to share our compassion with them. We have confidence in the resilience of human beings, and their ability to reinvent themselves. Speaking of reinvention, the internet is a great help. We want […]

  • 1
  • 2