نتایج جستجو برای: security papers
تعداد نتایج: 265761 فیلتر نتایج به سال:
With the rapid evolution of computing paradigms and the increasing popular of mobile devices, newly emerging mobile computing paradigms become more and more prevalent, such as crowd-souring computing, human-centred computing, mobile cloud computing etc. Moreover, with the emergence of new computing paradigms, communication networks experience unprecedented transformation which greatly improves ...
Properly benchmarking a system is a difficult and intricate task. Unfortunately, even a seemingly innocuous benchmarking mistake can compromise the guarantees provided by a given systems security defense and also put its reproducibility and comparability at risk. This threat is particularly insidious as it is generally not a result of malice and can easily go undetected by both authors and revi...
THE past several years have witnessed significant interest in security-related research in a wide range of application context spanning across homeland security, national and international security, economic and societal security, to personal and community security. A number of Information Technology-related academic disciplines including but not limited to information and computer sciences, in...
Editorial Special Issue on Image security: secure imaging—is it necessary? In the mathematical model of Shannon, ''the fundamental problem of communication is that of reproducing at one point either exactly or approximately a message selected at another point''. The pioneering papers of Shannon described also cryptographic coding for ensuring confidentiality. Efficient, confidential, authentic ...
Handwriting has been a popular biometric modality for decades in the fields of forensics and security. In forensic analysis, criminal justice usually relies on a writer identifier in conjunction with an expert to determine the authorship of handwritten materials, for example, threat letters. While in security applications, handwriting verification systems are expected to verify whether a user i...
SINCE 1980, the IEEE Symposium on Security and Privacy has been the premier annual forum for the presentation of scientific developments in information security and privacy technology, and for bringing together researchers and practitioners in the field. It is sponsored by the IEEE Computer Society Technical Committee on Security and Privacy, in co-operation with The International Association f...
ION This paper studies the security issues of the Instant Message (IM). This study is mainly based on three research publications. There are On Instant Messaging Worms, Analysis and Countermeasures [1], Instant Message or Instant Headache [2] and Secure Off-the-Record Messaging [3]. All of the three papers concentrate on the security issues of IM but from different perspectives. In this paper, ...
Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools to a remote control, transfer messages and financial transactions tools. One of the most important challenges in the mservices area is the security issue. Different papers have discussed various aspects of secured netwo...
RFID security is a relatively new research area. Within less than a decade, a large number of research papers dealing with security issues of RFID technology have appeared. In the first part of this paper, we attempt to summarise current research in the field of RFID security and discuss some of their open issues. In the second part of this paper, we address some of the open problems we suggest...
Security in Wireless Sensor Networks (WSNs) plays an important role in the node communication. The significant growth is existed for developing the wireless sensor network applications. The key features of Wireless sensor networks are low power, low memory, and low-energy. Due to this various facts, the existing security algorithms are not appropriate for current applications. Many papers have ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید