نتایج جستجو برای: security papers

تعداد نتایج: 265761  

Journal: :Journal of surveillance, security and safety 2021

The Journal of Surveillance, Security and Safety is an international, peer-reviewed, open access journal which provides a forum for the publication papers addressing variety theoretical, methodological, epistemological, empirical practical issues concerns reflected in field information security, cyber machine learning, emerging technologies, their applications.

2006
Skevos Evripidou Roy H. Campbell

We welcome our workshop attendees to a very interesting collection of discussions. We received many papers and had to limit the acceptance rate to 40those papers submitted. The papers cover a range of topics from infrastructure, service discovery, personalization, environments, security, privacy, to wireless and sensor networks, showing the scope of interests and activities represented by the P...

2012
Rajendra Kumar Patel

Cloud computing is emerging technology in today’s era. Its popularity is because of flexibility, scalability, cost reduction and on-demand service. But there is the demand of security in User-Cloud environment, because of dependency increases on the cloud. Several companies chooses cloud environment for business prospective. So when we choose cloud environment we must think about the security i...

2006
Andrew Woodward

The increased use and popularity of wireless networks has seen their adoption in medical information systems. They provide the advantages of mobility and instant information availability. Since its inception, wireless has had problems with providing adequate security measures. This paper examines previous papers dealing with securing data in a wireless network for medical use, and analyses curr...

Journal: :Optical Engineering 2011

Journal: :IEEE Trans. Computers 2018
Patrick Schaumont Ruby Lee Ronald Perez Guido Bertoni

COMPUTER architectures are profoundly affected by a new security landscape, caused by the dramatic evolution of information technology over the past decade. First, secure computer architectures have to support a wide range of security applications that extend well beyond the desktop environment, and that also include handheld, mobile, and embedded architectures, as well as high-end computing se...

2014
K. K. Mishra A. K. Misra Peter Mueller Gregorio Martinez Perez Sanjiv K. Bhatia Yong Wang

Over the last few decades, advancements in computer and software technologies have reached an impressive level.These technologies improve not only very common areas of our daily life, but also areas of education, health, production industries, and so on.Thus, recent advancements in computer and software technologies are the base for the society of tomorrow. The feasibility of future development...

Journal: :CoRR 2009
Mohammed A. Abuhelaleh Khaled M. Elleithy Thabet M. Mismar

Many papers have been proposed in order to increase the wireless sensor networks performance; This kind of network has limited resources, where the energy in each sensor came from a small battery that sometime is hard to be replaced or recharged. Transmission energy is the most concern part where the higher energy consumption takes place. Clustered hierarchy has been proposed in many papers; in...

2017
Naoyuki Awano

Using passwords only has rapidly become a security risk. Another approach to security is visual cryptography (VC), which divides paper documents into several encrypted papers managed by multiple people. Decryption occurs by stacking these papers, i.e., they cannot be decrypted individually. In our work, we consider a system for decrypting text encrypted by VC on digital devices. Furthermore, we...

2011

Why should wait for some days to get or receive the security protocols xvi 16th international workshop cambridge uk april 16 18 2008 revised selected papers lecture notes in computer science book that you order? Why should you take it if you can get the faster one? You can find the same book that you order right here. This is it the book that you can receive directly after purchasing. This secu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید