نتایج جستجو برای: Secure search

تعداد نتایج: 349641  

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

Journal: :IEEE Security & Privacy 2012

Journal: :Journal of Computer and System Sciences 2015

Journal: :Journal of cybersecurity and privacy 2021

Along with the use of cloud-based services, infrastructure, and storage, application logs in business critical applications is a standard practice. Application must be stored an accessible manner order to used whenever needed. The debugging these common situation where such access required. Frequently, part information contained records sensitive. In this paper, we evaluate possibility storing ...

Journal: :IEEE Transactions on Wireless Communications 2008

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید