نتایج جستجو برای: security needs

تعداد نتایج: 415429  

2018

Different human body parts such as eyes, veins, voices, face, fingers etc. have been considered for the biometrics system. Even the typing style and signature of human being have been the part of biometrics. To satisfy the different needs of the global market, different numbers of biometric techniques have been considered with the several advantages as compared to the others technique. However,...

Journal: :Information 2016
Huichen Lin Neil W. Bergmann

Often the Internet of Things (IoT) is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different to the needs of a domestic Smart Home environment. Additionally, the financial and human resources avai...

2018

Different human body parts such as eyes, veins, voices, face, fingers etc. have been considered for the biometrics system. Even the typing style and signature of human being have been the part of biometrics. To satisfy the different needs of the global market, different numbers of biometric techniques have been considered with the several advantages as compared to the others technique. However,...

2010
Mukesh Kumar Jha T. P. Sharma

In this paper, we have proposed a secure data aggregation protocol for wireless sensor networks (WSNs) that is robust to deceitful nodes. The goal of this protocol is to guarantee the essential security needs (like source authentication, data confidentiality & data integrity) as well as to achieve low communication overhead and be fitted with various aggregation functions (like sum, average, ma...

Journal: :JoSSR 2012
Mohammed Abdullatif Alzain Ben Soh Eric Pardede

In the commercial world, various computing needs are provided as a service. Service providers meet these computing needs in different ways, for example, by maintaining software or purchasing expensive hardware. Security is one of the most critical aspects in a cloud computing environment due to the sensitivity and importance of information stored in the cloud. The risk of malicious insiders in ...

2014
Sara Abdelwahab Ajith Abraham

Grid computing is the ultimate solution believed to meet the ever expanding computational needs of organizations. Nevertheless, privacy and integrity is the essential need of a user who runs applications from a remote machine on the grid where resource sharing is the main concern. Local host machine also needs same assurance with respect to client data and the jobs that execute on the host. As ...

2017

Different human body parts such as eyes, veins, voices, face, fingers etc. have been considered for the biometrics system. Even the typing style and signature of human being have been the part of biometrics. To satisfy the different needs of the global market, different numbers of biometric techniques have been considered with the several advantages as compared to the others technique. However,...

2018

Different human body parts such as eyes, veins, voices, face, fingers etc. have been considered for the biometrics system. Even the typing style and signature of human being have been the part of biometrics. To satisfy the different needs of the global market, different numbers of biometric techniques have been considered with the several advantages as compared to the others technique. However,...

2011
Murph Finnicum Samuel T. King

This position paper recognizes that general purpose robots will become increasingly common and argues that we need to prepare ourselves to deal with security for robot applications in an intelligent way. We discuss ways that robots are similar to traditional computing devices and ways that robots are different, and we describe the challenges that arise. We propose a framework for providing secu...

2011
Debabrata Singh Bhupendra Gupta

A Grid system is a Virtual Organization that is composed of several autonomous domains .It concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations.” The dynamic and multiinstitutional nature of these environments introduces challenging security issues that demand new technical approaches. In particular, one must deal with diverse local mechanism...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید