نتایج جستجو برای: security and privacy
تعداد نتایج: 16851797 فیلتر نتایج به سال:
The aim of this paper is to integrate security and privacy in mmWave communications. MmWave communication mechanism access three major key components secure (SC) operations. proposed design for facilitates the detection primary signal physical (PHY) layer find spectrum throughput user (PU) secondary (SU). SC PU with maximum being recorded at 0.7934 while SU 0.7679. So, we will a solving problem...
Paradigm shift towards cloud computing offers plethora of advantages both for users and Cloud Service Provider (CSP). For users, it saving cost, scaling resources, pay per use, elastic on-demand services. On the other hand, centralized resource management provisioning operations, safety security CSP. By holding multiple virtual IT resources (CPUs, storage servers, network components software) o...
Patient care is a key element of healthcare practices. The use Healthcare IoT could enhance the lives patients and quality services provided by medical practitioners, nurses, clinicians, pharmaceutical companies, government in general. Wireless monitoring systems tremendously used hospitals other practices witnessed as revolution field. Nevertheless, security privacy for interconnected things a...
Programmers’ lack of knowledge and ability in secure development threatens everyone who uses mobile apps. There’s no consensus on how to empower app programmers to get that knowledge. Based on interviews with twelve industry experts we argue that the discipline of secure app development is still at an early stage. Only once industry and academia have produced effective app developer motivation ...
Due to the rapid growth of data mining technology, obtaining private data on users through this technology becomes easier. Association Rules Mining is one of the data mining techniques to extract useful patterns in the form of association rules. One of the main problems in applying this technique on databases is the disclosure of sensitive data by endangering security and privacy. Hiding the as...
As everyday life is increasingly conducted online, and as the electronic world continues to move out into the physical, the privacy of information and action and the security of information systems are, increasingly, a focus of concern both for the research community and the public at large. Accordingly, privacy and security are active topics of investigation from a wide range of perspectives –...
Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous comput...
This position paper puts forth the agenda of privacy and security associated with the information technologies deployed in the developing world. We recognize that, while these issues are widely discussed in the Western world, they have not got much attention in the context of the developing countries. Following the tensions between the situated nature of the concepts and practices around securi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید