Showing 641 - 660 results of 5,943 for search '"security"', query time: 0.08s Refine Results
  1. 641

    qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era by Hyoungsub Shim, Bongho Kang, Haejung Im, Duhyun Jeon, Seok-Min Kim

    Published 2025-01-01
    “…PUFs offer a hardware-based security mechanism that is resistant to cloning and tampering, ensuring that the encryption keys remain secure against both classical and quantum attacks. …”
    Get full text
    Article
  2. 642

    Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment by Yuan Gao, Hequn Xian, Aimin Yu

    Published 2020-03-01
    “…In order to ensure data security for deduplication, different data should be assigned with different privacy levels. …”
    Get full text
    Article
  3. 643
  4. 644

    Concepts and types of administrative and legal means of ensuring economic security by the National Police of Ukraine by V. V. Tolochko

    Published 2018-12-01
    “…The conducted research should become the basis for studying the problems of certain administrative and legal means of ensuring economic security by the National Police of Ukraine, which is a perspective direction for further scientific research.…”
    Get full text
    Article
  5. 645
  6. 646
  7. 647

    Wireless body area network: Architecture and security mechanism for healthcare using internet of things by Arun Kumar, Ritu Dewan, Wisam Subhi Al-Dayyeni, Bharat Bhushan, Jayant Giri, Sardar MN Islam, Ahmed Elaraby

    Published 2025-01-01
    “…The data generated by small sensor devices need strong security methods for secure transmission over a public network. …”
    Get full text
    Article
  8. 648

    Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks by B. Madhusudhanan, S. Chitra, C. Rajan

    Published 2015-01-01
    “…In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. …”
    Get full text
    Article
  9. 649
  10. 650
  11. 651
  12. 652

    A Secure Privacy-Preserving Data Aggregation Model in Wearable Wireless Sensor Networks by Changlun Zhang, Chao Li, Jian Zhang

    Published 2015-01-01
    “…So, privacy preservation is becoming an increasingly important issue in security data aggregation. In this paper, we propose a security privacy-preserving data aggregation model, which adopts a mixed data aggregation structure. …”
    Get full text
    Article
  13. 653
  14. 654
  15. 655

    Strong incidence domination in some operations of fuzzy incidence graphs and application in security allocation by Kavya R. Nair, M. S. Sunitha

    Published 2024-12-01
    “…Additionally, the paper discusses an application of SID in security allocation.…”
    Get full text
    Article
  16. 656
  17. 657
  18. 658

    BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid by Wei Ren, Jun Song, Min Lei, Yi Ren

    Published 2011-01-01
    “…BVS can achieve forward and backward security and only relies on hash functions. Security analysis justifies that the proposed schemes, especially BVS, can attain the security goals with low computation and storage cost.…”
    Get full text
    Article
  19. 659

    Improved Population Intelligence Algorithm and BP Neural Network for Network Security Posture Prediction by Yueying Li, Feng Wu

    Published 2023-01-01
    “…To address the problems of low prediction accuracy and slow convergence of the network security posture prediction model, a population intelligence optimization algorithm is proposed to improve the network security posture prediction model of the BP neural network. …”
    Get full text
    Article
  20. 660