نتایج جستجو برای: keywords human security
تعداد نتایج: 3647114 فیلتر نتایج به سال:
This paper is a review on the aspects and approaches of design an image cryptosystem. First a general introduction given for cryptography and images encryption and followed by different techniques in image encryption and related works for each technique surveyed. Finally, general security analysis methods for encrypted images are mentioned. Keywords—Image, cryptography, encryption, security, an...
this paper summarizes opportunities and challenges concerning how we can achieve security while still ensuring privacy. It identifies research directions and includes a number of questions that have been debated by the panel. Keywords—cyber security; information privacy; privacypreserving data analytics
ThisarticleintroducesadistributedintelligencenetworkofFogcomputingnodesandClouddata centresforsmartdevicesagainstXSSvulnerabilitiesinOnlineSocialNetwork(OSN).Thecloud datacentrescomputethefeaturesofJavaScript,injectsthemintheformofcommentsandsavedthem inthescriptnodesofDocumentObjectModel(DOM)tree.ThenetworkofFogdevicesre-executes the...
Vanishree et.al proposed a novel unconditionally oblivious polynomial evaluation protocol and they claimed that can fulfill both sender and receiver’s security. Here, this protocol is cryptanalyzed. We find that it has a fatal fault which cannot implement the receiver’s security at all and show the detail analyzing process. Keywords oblivious polynomial evaluation, oblivious transfer, multi-par...
Cloud computing technologyhas opened an avenue tomeet the critical need to securely share distributedresourcesandwebservices,andespeciallythosethatbelongtoclientswhohavesensitive dataandapplications.However,implementingcrosscuttingconcernsforcloud-basedapplicationsis achallenge.ThischallengestemsfromthenatureofdistributedWeb-basedtechnologyar...
Security is a growing concern for embedded system designers. Therefore a wide range of protection mechanisms have been developed in the recent years to counter malicious attacks. This work gives an overview and compares existing solutions concerning the protection of the test access port. Potential improvements are then proposed over some of the previous works. Keywords—security, JTAG, IEEE 168...
This article pursues two tasks. The first is to clarify the value and productivity of Williams’s Keywords: a vocabulary culture society (first edition 1976, second expanded 1983a) for project Cultural Studies. clarification helped, I argue, by reading it alongside Vološinov’s Marxism philosophy language (published in Russian 1929, translated into English 1973). related task speculative developm...
The increasing dependence of European Union member countries on imported oil and gas has led to concerns about energy supply and security. At the same time the share of clean energy in Europe’s energy consumption basket is increasing due to environmental issues. About a quarter of all energy consumption in the EU is natural gas, and most EU member states import almost all of their energy resou...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید