نتایج جستجو برای: keywords human security

تعداد نتایج: 3647114  

Journal: :Science and Technology Development Journal 2009

Journal: :Toruńskie Studia Międzynarodowe 2015

2013
Ali Soleymani Zulkarnain Md Ali Md Jan Nordin

This paper is a review on the aspects and approaches of design an image cryptosystem. First a general introduction given for cryptography and images encryption and followed by different techniques in image encryption and related works for each technique surveyed. Finally, general security analysis methods for encrypted images are mentioned. Keywords—Image, cryptography, encryption, security, an...

2014
Elisa Bertino

this paper summarizes opportunities and challenges concerning how we can achieve security while still ensuring privacy. It identifies research directions and includes a number of questions that have been debated by the panel. Keywords—cyber security; information privacy; privacypreserving data analytics

Journal: :Int. J. Web Service Res. 2017
Shashank Gupta Brij Bhooshan Gupta

ThisarticleintroducesadistributedintelligencenetworkofFogcomputingnodesandClouddata centresforsmartdevicesagainstXSSvulnerabilitiesinOnlineSocialNetwork(OSN).Thecloud datacentrescomputethefeaturesofJavaScript,injectsthemintheformofcommentsandsavedthem inthescriptnodesofDocumentObjectModel(DOM)tree.ThenetworkofFogdevicesre-executes the...

Journal: :IACR Cryptology ePrint Archive 2012
Qinglong Wang Li Xu

Vanishree et.al proposed a novel unconditionally oblivious polynomial evaluation protocol and they claimed that can fulfill both sender and receiver’s security. Here, this protocol is cryptanalyzed. We find that it has a fatal fault which cannot implement the receiver’s security at all and show the detail analyzing process. Keywords oblivious polynomial evaluation, oblivious transfer, multi-par...

Journal: :Int. J. Web Service Res. 2018
Anas M. R. Alsobeh Aws Abed Al Raheem Magableh Emad Alsukhni

Cloud computing technologyhas opened an avenue tomeet the critical need to securely share distributedresourcesandwebservices,andespeciallythosethatbelongtoclientswhohavesensitive dataandapplications.However,implementingcrosscuttingconcernsforcloud-basedapplicationsis achallenge.ThischallengestemsfromthenatureofdistributedWeb-basedtechnologyar...

2016
Benjamin Dauphin

Security is a growing concern for embedded system designers. Therefore a wide range of protection mechanisms have been developed in the recent years to counter malicious attacks. This work gives an overview and compares existing solutions concerning the protection of the test access port. Potential improvements are then proposed over some of the previous works. Keywords—security, JTAG, IEEE 168...

Journal: :Cultural Studies 2021

This article pursues two tasks. The first is to clarify the value and productivity of Williams’s Keywords: a vocabulary culture society (first edition 1976, second expanded 1983a) for project Cultural Studies. clarification helped, I argue, by reading it alongside Vološinov’s Marxism philosophy language (published in Russian 1929, translated into English 1973). related task speculative developm...

, ,

The increasing dependence of European Union member countries on imported oil and gas has led to concerns about energy supply and security.  At the same time the share of clean energy in Europe’s energy consumption basket is increasing due to environmental issues. About a quarter of all energy consumption in the EU is natural gas, and most EU member states import almost all of their energy resou...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید