نتایج جستجو برای: security papers

تعداد نتایج: 265761  

2016
Ilsun You

With the rapid evolution of computing paradigms and the increasing popular of mobile devices, newly emerging mobile computing paradigms become more and more prevalent, such as crowd-souring computing, human-centred computing, mobile cloud computing etc. Moreover, with the emergence of new computing paradigms, communication networks experience unprecedented transformation which greatly improves ...

Journal: :CoRR 2018
Erik van der Kouwe Dennis Andriesse Herbert Bos Cristiano Giuffrida Gernot Heiser

Properly benchmarking a system is a difficult and intricate task. Unfortunately, even a seemingly innocuous benchmarking mistake can compromise the guarantees provided by a given systems security defense and also put its reproducibility and comparability at risk. This threat is particularly insidious as it is generally not a result of malice and can easily go undetected by both authors and revi...

Journal: :IEEE Trans. Knowl. Data Eng. 2008
Daniel Dajun Zeng Hsinchun Chen Fei-Yue Wang Hillol Kargupta

THE past several years have witnessed significant interest in security-related research in a wide range of application context spanning across homeland security, national and international security, economic and societal security, to personal and community security. A number of Information Technology-related academic disciplines including but not limited to information and computer sciences, in...

Journal: :Sig. Proc.: Image Comm. 2003
Touradj Ebrahimi Benoit M. Macq

Editorial Special Issue on Image security: secure imaging—is it necessary? In the mathematical model of Shannon, ''the fundamental problem of communication is that of reproducing at one point either exactly or approximately a message selected at another point''. The pioneering papers of Shannon described also cryptographic coding for ensuring confidentiality. Efficient, confidential, authentic ...

2009
Jin Chen

Handwriting has been a popular biometric modality for decades in the fields of forensics and security. In forensic analysis, criminal justice usually relies on a writer identifier in conjunction with an expert to determine the authorship of handwritten materials, for example, threat letters. While in security applications, handwriting verification systems are expected to verify whether a user i...

Journal: :IEEE Trans. Dependable Sec. Comput. 2005
Vern Paxson Michael Waidner

SINCE 1980, the IEEE Symposium on Security and Privacy has been the premier annual forum for the presentation of scientific developments in information security and privacy technology, and for bringing together researchers and practitioners in the field. It is sponsored by the IEEE Computer Society Technical Committee on Security and Privacy, in co-operation with The International Association f...

2007
Hui Gu

ION This paper studies the security issues of the Instant Message (IM). This study is mainly based on three research publications. There are On Instant Messaging Worms, Analysis and Countermeasures [1], Instant Message or Instant Headache [2] and Secure Off-the-Record Messaging [3]. All of the three papers concentrate on the security issues of IM but from different perspectives. In this paper, ...

Journal: :JDCTA 2010
Fatemeh NasserEslami Fatemeh Saghafi

Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools to a remote control, transfer messages and financial transactions tools. One of the most important challenges in the mservices area is the security issue. Different papers have discussed various aspects of secured netwo...

2010
Dang Nguyen Duc Divyan M. Konidala Hyunrok Lee Kwangjo Kim

RFID security is a relatively new research area. Within less than a decade, a large number of research papers dealing with security issues of RFID technology have appeared. In the first part of this paper, we attempt to summarise current research in the field of RFID security and discuss some of their open issues. In the second part of this paper, we address some of the open problems we suggest...

2017
Khalid M. Abdullah Essam H. Houssein Hala H. Zayed

Security in Wireless Sensor Networks (WSNs) plays an important role in the node communication. The significant growth is existed for developing the wireless sensor network applications. The key features of Wireless sensor networks are low power, low memory, and low-energy. Due to this various facts, the existing security algorithms are not appropriate for current applications. Many papers have ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید