نتایج جستجو برای: security papers
تعداد نتایج: 265761 فیلتر نتایج به سال:
The Journal of Surveillance, Security and Safety is an international, peer-reviewed, open access journal which provides a forum for the publication papers addressing variety theoretical, methodological, epistemological, empirical practical issues concerns reflected in field information security, cyber machine learning, emerging technologies, their applications.
We welcome our workshop attendees to a very interesting collection of discussions. We received many papers and had to limit the acceptance rate to 40those papers submitted. The papers cover a range of topics from infrastructure, service discovery, personalization, environments, security, privacy, to wireless and sensor networks, showing the scope of interests and activities represented by the P...
Cloud computing is emerging technology in today’s era. Its popularity is because of flexibility, scalability, cost reduction and on-demand service. But there is the demand of security in User-Cloud environment, because of dependency increases on the cloud. Several companies chooses cloud environment for business prospective. So when we choose cloud environment we must think about the security i...
The increased use and popularity of wireless networks has seen their adoption in medical information systems. They provide the advantages of mobility and instant information availability. Since its inception, wireless has had problems with providing adequate security measures. This paper examines previous papers dealing with securing data in a wireless network for medical use, and analyses curr...
COMPUTER architectures are profoundly affected by a new security landscape, caused by the dramatic evolution of information technology over the past decade. First, secure computer architectures have to support a wide range of security applications that extend well beyond the desktop environment, and that also include handheld, mobile, and embedded architectures, as well as high-end computing se...
Over the last few decades, advancements in computer and software technologies have reached an impressive level.These technologies improve not only very common areas of our daily life, but also areas of education, health, production industries, and so on.Thus, recent advancements in computer and software technologies are the base for the society of tomorrow. The feasibility of future development...
Many papers have been proposed in order to increase the wireless sensor networks performance; This kind of network has limited resources, where the energy in each sensor came from a small battery that sometime is hard to be replaced or recharged. Transmission energy is the most concern part where the higher energy consumption takes place. Clustered hierarchy has been proposed in many papers; in...
Using passwords only has rapidly become a security risk. Another approach to security is visual cryptography (VC), which divides paper documents into several encrypted papers managed by multiple people. Decryption occurs by stacking these papers, i.e., they cannot be decrypted individually. In our work, we consider a system for decrypting text encrypted by VC on digital devices. Furthermore, we...
Why should wait for some days to get or receive the security protocols xvi 16th international workshop cambridge uk april 16 18 2008 revised selected papers lecture notes in computer science book that you order? Why should you take it if you can get the faster one? You can find the same book that you order right here. This is it the book that you can receive directly after purchasing. This secu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید