Showing 521 - 540 results of 5,943 for search '"security"', query time: 0.08s Refine Results
  1. 521
  2. 522
  3. 523
  4. 524

    A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization by Su-Wan Park, JaeDeok Lim, Jeong Nyeo Kim

    Published 2015-02-01
    “…Recently, the development of smart phones has been reported the number of security vulnerabilities. Although these smart phones have a concept of Sandbox for the security, sensitive personal information has been still exposed by internal data exchange or root privilege acquisition. …”
    Get full text
    Article
  5. 525
  6. 526
  7. 527
  8. 528

    An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers by Mauricio Zapateiro De la Hoz, Leonardo Acho, Yolanda Vidal

    Published 2015-01-01
    “…Security and secrecy are some of the important concerns in the communications world. …”
    Get full text
    Article
  9. 529

    A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges by Donagani Ramakrishna, Mohammed Ali Shaik

    Published 2025-01-01
    “…To analyze the efficiency of these algorithms, a comparative study was conducted using crucial factors, including security, secrecy, and integrity. The assessment also examines known flaws and prospective attacks for each algorithm and highlights current methods and future research gaps. …”
    Get full text
    Article
  10. 530
  11. 531
  12. 532
  13. 533
  14. 534
  15. 535
  16. 536
  17. 537

    DYSSS: A Dynamic and Context-Aware Security System for Shared Sensor Networks by Claudio M. de Farias, Luci Pirmez, Luiz F. R. C. Carmo, Davidson Boccardo, Flávia C. Delicato, Igor L. dos Santos, Renato Pinheiro, Rafael O. Costa

    Published 2015-11-01
    “…In this work we propose a Dynamic Security System to be applied in the shared sensor network context. …”
    Get full text
    Article
  18. 538

    Secure and Efficient Cluster-Based Range Query Processing in Wireless Sensor Networks by Liming Zhou, Yingzi Shan, Lu Chen

    Published 2018-01-01
    “…To deal with this problem, we propose a secure and efficient scheme for cluster-based query processing in wireless sensor networks. …”
    Get full text
    Article
  19. 539
  20. 540

    Instruction and demonstration-based secure service attribute generation mechanism for textual data by LI Chenhao, WANG Na, LIU Aodi

    Published 2024-12-01
    “…Attribute-based access control is fundamentally dependent on the secure service attribute calibration of object sources. …”
    Get full text
    Article