Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę ""Computer Security"" wg kryterium: Temat


Starter badań:

Tytuł:
A Privacy-Preserving, Two-Party, Secure Computation Mechanism for Consensus-Based Peer-to-Peer Energy Trading in the Smart Grid.
Autorzy:
Li Z; China Electric Power Research Institute, Beijing 100081, China.
Xu H; State Grid Corporation of China, Beijing 100031, China.
Zhai F; China Electric Power Research Institute, Beijing 100081, China.; School of Electrical and Information Engineering, Tianjin University, Tianjin 300072, China.
Zhao B; China Electric Power Research Institute, Beijing 100081, China.
Xu M; China Electric Power Research Institute, Beijing 100081, China.
Guo Z; Hangzhou Innovative Institute, Beihang University, Hangzhou 310051, China.; Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University, Hangzhou 311121, China.
Pokaż więcej
Źródło:
Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Nov 21; Vol. 22 (22). Date of Electronic Publication: 2022 Nov 21.
Typ publikacji:
Journal Article
MeSH Terms:
Privacy*
Computer Security*
Consensus ; Computer Systems
Czasopismo naukowe
Tytuł:
Secure Vehicular Platoon Management against Sybil Attacks.
Autorzy:
Junaidi DR; School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore 639798, Singapore.
Ma M; College of Engineering, Qatar University, Doha P.O. Box 2713, Qatar.
Su R; School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore 639798, Singapore.
Pokaż więcej
Źródło:
Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Nov 21; Vol. 22 (22). Date of Electronic Publication: 2022 Nov 21.
Typ publikacji:
Journal Article
MeSH Terms:
Algorithms*
Computer Security*
Humans ; Confidentiality ; Privacy ; Probability
Czasopismo naukowe
Tytuł:
A Dynamic Deployment Method of Security Services Based on Malicious Behavior Knowledge Base.
Autorzy:
Guo Q; School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China.
Li M; School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China.
Wang W; School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China.
Liu Y; School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China.
Pokaż więcej
Źródło:
Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Nov 21; Vol. 22 (22). Date of Electronic Publication: 2022 Nov 21.
Typ publikacji:
Journal Article
MeSH Terms:
Computer Security*
Knowledge Bases*
Czasopismo naukowe
Tytuł:
Multiagent-Based Data Presentation Mechanism for Multifaceted Analysis in Network Management Tasks.
Autorzy:
Sasai K; Graduate School of Science and Engineering, Ibaraki University, Hitachi 316-8511, Japan.
Fukutani R; Research and Education Faculty, Humanities and Social Science Cluster, Education Unit, Kochi University, Kochi 780-8072, Japan.
Kitagata G; Department of English Language and Culture, Faculty of Humanities, Morioka University, Takizawa 020-0605, Japan.
Kinoshita T; Research Institute of Electrical Communication, Tohoku University, Sendai 980-8577, Japan.
Pokaż więcej
Źródło:
Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Nov 15; Vol. 22 (22). Date of Electronic Publication: 2022 Nov 15.
Typ publikacji:
Journal Article
MeSH Terms:
Artificial Intelligence*
Computer Security*
Big Data ; Heuristics ; Problem Solving
Czasopismo naukowe
Tytuł:
Impact of cybersecurity measures on improving institutional governance and digitalization for sustainable healthcare.
Autorzy:
Abbas HSM; College of Public Administration, Huazhong University of Science and Technology, Wuhan, P.R. China.
Qaisar ZH; Department of Computer Science, NFC Institute of Engineering and Technology, Multan, Pakistan.
Ali G; Department of CS, University of Okara, Renala Khurd, Pakistan.
Alturise F; Department of Computer, College of Science and Arts in Ar Rass, Qassim University, Ar Rass, Qassim, Saudi Arabia.
Alkhalifah T; Department of Computer, College of Science and Arts in Ar Rass, Qassim University, Ar Rass, Qassim, Saudi Arabia.
Pokaż więcej
Źródło:
PloS one [PLoS One] 2022 Nov 15; Vol. 17 (11), pp. e0274550. Date of Electronic Publication: 2022 Nov 15 (Print Publication: 2022).
Typ publikacji:
Journal Article; Research Support, Non-U.S. Gov't
MeSH Terms:
Delivery of Health Care*
Computer Security*
Government ; Developing Countries ; Health Facilities
Czasopismo naukowe
Tytuł:
A Data-Driven Noninteractive Authentication Scheme for the Internet of Vehicles in Mobile Heterogeneous Networks.
Autorzy:
Wang Z; School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China.
Dong P; School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China.
Zhang Y; School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China.
Zhang H; School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China.
Pokaż więcej
Źródło:
Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Nov 09; Vol. 22 (22). Date of Electronic Publication: 2022 Nov 09.
Typ publikacji:
Journal Article
MeSH Terms:
Computer Security*
Internet*
Social Networking
Czasopismo naukowe
Tytuł:
Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm.
Autorzy:
Kumar P; Department of Computer Science and Engineering, JSS Academy of Technical Education, Noida 201301, Uttar Pradesh, India.; Institute of Engineering & Technology, Shobhit University, Meerut 250110, Uttar Pradesh, India.
Banerjee K; Department of Computer Science and Engineering, JSS Academy of Technical Education, Noida 201301, Uttar Pradesh, India.
Singhal N; Department of Computer Science and Engineering, Chotu Ram Engineering College, Meerut 250001, Uttar Pradesh, India.
Kumar A; Department of Computer Science and Engineering, JSS Academy of Technical Education, Noida 201301, Uttar Pradesh, India.
Rani S; Department of Computer Science and Engineering, Guru Nanak Dev Engineering College, Ludhiana 141006, Punjab, India.
Kumar R; Department of Mechanical and Production Engineering, Guru Nanak Dev Engineering College, Ludhiana 141006, Punjab, India.
Lavinia CA; CMI Cioca Adriana Lavinia, 22 Dorobantilor Street, 550231 Sibiu, Romania.
Pokaż więcej
Źródło:
Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Nov 08; Vol. 22 (22). Date of Electronic Publication: 2022 Nov 08.
Typ publikacji:
Journal Article
MeSH Terms:
Computer Security*
Telemedicine*
Humans ; Confidentiality ; Algorithms ; Software
Czasopismo naukowe
Tytuł:
Smart Home Privacy Protection Methods against a Passive Wireless Snooping Side-Channel Attack.
Autorzy:
Nassiri Abrishamchi MA; School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Johor Bahru 81310, Malaysia.
Zainal A; School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Johor Bahru 81310, Malaysia.
Ghaleb FA; School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Johor Bahru 81310, Malaysia.
Qasem SN; Computer Science Department, College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh 11432, Saudi Arabia.
Albarrak AM; Computer Science Department, College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh 11432, Saudi Arabia.
Pokaż więcej
Źródło:
Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Nov 07; Vol. 22 (21). Date of Electronic Publication: 2022 Nov 07.
Typ publikacji:
Journal Article; Review
MeSH Terms:
Privacy*
Computer Security*
Confidentiality ; Wireless Technology ; Technology
Czasopismo naukowe
Tytuł:
Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption.
Autorzy:
Ali RS; Electrical Engineering Department, College of Engineering, Al Iraqia University, Baghdad 10071, Iraq.
Akif OZ; Department of Computer Science, College of Education for Pure Science (Ibn al-Haitham), University of Baghdad, Baghdad 10066, Iraq.
Jassim SA; Department of Computer Sciences, University of Technology, Baghdad 10066, Iraq.
Farhan AK; Department of Computer Sciences, University of Technology, Baghdad 10066, Iraq.
El-Kenawy EM; Department of Communications and Electronics, Delta Higher Institute of Engineering and Technology, Mansoura 35111, Egypt.
Ibrahim A; Computer Engineering and Control Systems Department, Faculty of Engineering, Mansoura University, Mansoura 35516, Egypt.
Ghoneim ME; Department of Mathematical Sciences, Faculty of Applied Science, Umm Al-Qura University, Makkah 21955, Saudi Arabia.; Faculty of Computers and Artificial Intelligence, Damietta University, Damietta 34517, Egypt.
Abdelhamid AA; Department of Computer Science, Faculty of Computer and Information Sciences, Ain Shams University, Cairo 11566, Egypt.
Pokaż więcej
Źródło:
Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Nov 05; Vol. 22 (21). Date of Electronic Publication: 2022 Nov 05.
Typ publikacji:
Journal Article
MeSH Terms:
Computer Security*
Algorithms*
Entropy
Czasopismo naukowe
Tytuł:
A Secure LEACH-PRO Protocol Based on Blockchain.
Autorzy:
Aljumaie GS; Department of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia.
Alhakami W; Department of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia.
Pokaż więcej
Źródło:
Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Nov 02; Vol. 22 (21). Date of Electronic Publication: 2022 Nov 02.
Typ publikacji:
Journal Article
MeSH Terms:
Computer Security*
Blockchain*
Internet
Czasopismo naukowe
Tytuł:
Secure secondary utilization system of genomic data using quantum secure cloud.
Autorzy:
Fujiwara M; National Institute of Information and Communications Technology (NICT), 4-2-1 Nukui-Kita, Koganei, Tokyo, 184-8795, Japan. .
Hashimoto H; Human Biosciences Unit for the Top Global Course Center for the Promotion of Interdisciplinary Education and Research, Center for Genomic Medicine, Graduate School of Medicine, Kyoto University, Kyoto, 606-8507, Japan.
Doi K; Corporate Research and Development Center, Toshiba Corporation, 1, Komukai Toshiba-Cho, Saiwai-Ku, Kawasaki-Shi, 212-8582, Japan.
Kujiraoka M; Corporate Research and Development Center, Toshiba Corporation, 1, Komukai Toshiba-Cho, Saiwai-Ku, Kawasaki-Shi, 212-8582, Japan.
Tanizawa Y; Corporate Research and Development Center, Toshiba Corporation, 1, Komukai Toshiba-Cho, Saiwai-Ku, Kawasaki-Shi, 212-8582, Japan.
Ishida Y; ZenmuTech, Inc., THE HUB Ginza, OCT 804, 8-17-5 Ginza Chuo-Ku, Tokyo, 104-0061, Japan.
Sasaki M; National Institute of Information and Communications Technology (NICT), 4-2-1 Nukui-Kita, Koganei, Tokyo, 184-8795, Japan.
Nagasaki M; Human Biosciences Unit for the Top Global Course Center for the Promotion of Interdisciplinary Education and Research, Center for Genomic Medicine, Graduate School of Medicine, Kyoto University, Kyoto, 606-8507, Japan. .
Pokaż więcej
Źródło:
Scientific reports [Sci Rep] 2022 Nov 02; Vol. 12 (1), pp. 18530. Date of Electronic Publication: 2022 Nov 02.
Typ publikacji:
Journal Article
MeSH Terms:
Cloud Computing*
Computer Security*
Humans ; Genomics ; Genome, Human ; Software ; Algorithms
Czasopismo naukowe
Tytuł:
A security scheme for distributing analysis codes supporting CDM-based research in a multi-center environment.
Autorzy:
Jeon S; Graduate School of Information Security, Korea University, 145, Anrm-ro, Seongbuk-gu, Seoul, 02841, Republic of Korea. Electronic address: .
Shin C; Graduate School of Information Security, Korea University, 145, Anrm-ro, Seongbuk-gu, Seoul, 02841, Republic of Korea. Electronic address: .
Ko E; Graduate School of Information Security, Korea University, 145, Anrm-ro, Seongbuk-gu, Seoul, 02841, Republic of Korea. Electronic address: .
Moon J; Graduate School of Information Security, Korea University, 145, Anrm-ro, Seongbuk-gu, Seoul, 02841, Republic of Korea. Electronic address: .
Pokaż więcej
Źródło:
Computer methods and programs in biomedicine [Comput Methods Programs Biomed] 2022 Nov; Vol. 226, pp. 107159. Date of Electronic Publication: 2022 Sep 27.
Typ publikacji:
Multicenter Study; Journal Article
MeSH Terms:
Computer Security*
Telemedicine*
Humans ; Confidentiality
Czasopismo naukowe
Tytuł:
Diabetes technology and cybersecurity-a growing cause for concern.
Autorzy:
Carmona Alexandrino H; Endocrinology Department, Centro Hospitalar Vila Nova de Gaia/Espinho, Vila Nova de Gaia, Portugal. .
Almeida Ferreira M; Endocrinology Department, Centro Hospitalar Vila Nova de Gaia/Espinho, Vila Nova de Gaia, Portugal.
Oliveira MJ; Endocrinology Department, Centro Hospitalar Vila Nova de Gaia/Espinho, Vila Nova de Gaia, Portugal.
Pokaż więcej
Źródło:
Endocrine [Endocrine] 2022 Nov; Vol. 78 (2), pp. 392-393. Date of Electronic Publication: 2022 Sep 09.
Typ publikacji:
Letter
MeSH Terms:
Computer Security*
Diabetes Mellitus*
Humans ; Technology
Opinia redakcyjna
Tytuł:
Neurodynamic approaches for sparse recovery problem with linear inequality constraints.
Autorzy:
Yang J; Chongqing Key Laboratory of Nonlinear Circuits and Intelligent Information Processing, School of Electronic and Information Engineering, Southwest University, Chongqing 400715, China. Electronic address: yangjiao_.
He X; Chongqing Key Laboratory of Nonlinear Circuits and Intelligent Information Processing, School of Electronic and Information Engineering, Southwest University, Chongqing 400715, China. Electronic address: .
Huang T; Department of Mathematics, Texas A&M University at Qatar, Doha 23874, Qatar. Electronic address: .
Pokaż więcej
Źródło:
Neural networks : the official journal of the International Neural Network Society [Neural Netw] 2022 Nov; Vol. 155, pp. 592-601. Date of Electronic Publication: 2022 Sep 17.
Typ publikacji:
Journal Article
MeSH Terms:
Neural Networks, Computer*
Computer Security*
Consensus
Czasopismo naukowe
Tytuł:
Secure Medical Data Model Using Integrated Transformed Paillier and KLEIN Algorithm Encryption Technique with Elephant Herd Optimization for Healthcare Applications.
Autorzy:
Alluhaidan AS; Department of Information Systems, College of Computer and Information Science, Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia.
Pokaż więcej
Źródło:
Journal of healthcare engineering [J Healthc Eng] 2022 Oct 25; Vol. 2022, pp. 3991295. Date of Electronic Publication: 2022 Oct 25 (Print Publication: 2022).
Typ publikacji:
Journal Article; Research Support, Non-U.S. Gov't
MeSH Terms:
Computer Security*
Elephants*
Animals ; Humans ; Confidentiality ; Algorithms ; Delivery of Health Care
Czasopismo naukowe
Tytuł:
EDLaaS:Fully Homomorphic Encryption over Neural Network Graphs for Vision and Private Strawberry Yield Forecasting.
Autorzy:
Onoufriou G; School of Computer Science, University of Lincoln, Lincoln LN6 7TS, UK.
Hanheide M; School of Computer Science, University of Lincoln, Lincoln LN6 7TS, UK.
Leontidis G; Interdisciplinary Centre for Data and AI & School of Natural and Computing Sciences, University of Aberdeen, Aberdeen AB24 3FX, UK.
Pokaż więcej
Źródło:
Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Oct 24; Vol. 22 (21). Date of Electronic Publication: 2022 Oct 24.
Typ publikacji:
Journal Article
MeSH Terms:
Computer Security*
Fragaria*
Privacy ; Neural Networks, Computer ; Machine Learning
Czasopismo naukowe
Tytuł:
A Comprehensive Survey on the Non-Invasive Passive Side-Channel Analysis.
Autorzy:
Socha P; Department of Digital Design, Faculty of Information Technology, Czech Technical University in Prague, 160 00 Prague, Czech Republic.
Miškovský V; Department of Digital Design, Faculty of Information Technology, Czech Technical University in Prague, 160 00 Prague, Czech Republic.
Novotný M; Department of Digital Design, Faculty of Information Technology, Czech Technical University in Prague, 160 00 Prague, Czech Republic.
Pokaż więcej
Źródło:
Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Oct 22; Vol. 22 (21). Date of Electronic Publication: 2022 Oct 22.
Typ publikacji:
Journal Article; Review
MeSH Terms:
Computer Security*
Computers*
Software ; Benchmarking
Czasopismo naukowe
Tytuł:
An Efficient Chaos-Based Image Encryption Technique Using Bitplane Decay and Genetic Operators.
Autorzy:
Premkumar R; Department of Electronics and Communication Engineering, Mount Zion College of Engineering and Technology, Pudukottai 622 507, India.
Mahdal M; Department of Control Systems and Instrumentation, Faculty of Mechanical Engineering, VSB-Technical University of Ostrava, 17. Listopadu 2172/15, 708 00 Ostrava, Czech Republic.
Elangovan M; Department of R&D, Bond Marine Consultancy, London EC1V 2NX, UK.
Pokaż więcej
Źródło:
Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Oct 21; Vol. 22 (20). Date of Electronic Publication: 2022 Oct 21.
Typ publikacji:
Journal Article
MeSH Terms:
Computer Security*
Image Processing, Computer-Assisted*/methods
Operator Regions, Genetic ; Algorithms ; Computer Simulation
Czasopismo naukowe
Tytuł:
MRBSChain a novel scalable medical records binance smart chain framework enabling a paradigm shift in medical records management.
Autorzy:
Monga S; Department of Computer Science and Engineering, Chaudhary Devi Lal University, Sirsa, HR, 125055, India. .
Singh D; Department of Computer Science and Engineering, Chaudhary Devi Lal University, Sirsa, HR, 125055, India.
Pokaż więcej
Źródło:
Scientific reports [Sci Rep] 2022 Oct 21; Vol. 12 (1), pp. 17660. Date of Electronic Publication: 2022 Oct 21.
Typ publikacji:
Journal Article
MeSH Terms:
Computer Security*
Blockchain*
Female ; Humans ; Male ; Ecosystem ; Electronic Health Records ; Forms and Records Control
Czasopismo naukowe
Tytuł:
Enhanced Modbus/TCP Security Protocol: Authentication and Authorization Functions Supported.
Autorzy:
Martins T; Departamento de Engenharia Elétrica, Universidade do Estado de Santa Catarina, Joinville 89219-710, Brazil.
Oliveira SVG; Departamento de Engenharia Elétrica, Universidade do Estado de Santa Catarina, Joinville 89219-710, Brazil.; Departamento de Engenharia de Telecomunicações, Elétrica e Mecânica, Universidade Regional de Blumenau, Blumenau 89030-000, Brazil.
Pokaż więcej
Źródło:
Sensors (Basel, Switzerland) [Sensors (Basel)] 2022 Oct 20; Vol. 22 (20). Date of Electronic Publication: 2022 Oct 20.
Typ publikacji:
Journal Article
MeSH Terms:
Computer Security*
Telemedicine*
Humans ; Confidentiality ; Software
Czasopismo naukowe

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies

Prześlij opinię

Twoje opinie są dla nas bardzo ważne i mogą być niezwykle pomocne w pokazaniu nam, gdzie możemy dokonać ulepszeń. Bylibyśmy bardzo wdzięczni za poświęcenie kilku chwil na wypełnienie krótkiego formularza.

Formularz