نتایج جستجو برای: security papers

تعداد نتایج: 265761  

2004
Ajith Abraham Sugata Sanyal Lakhmi Jain

The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centres and military installations to name a few. Finding effective ways to protect information systems, networks and sensitive data wit...

Journal: :J. High Speed Networks 2006
Suresh Subramaniam Krishna M. Sivalingam G. Manimaran

Security was not an inherent feature of the Internet when it was originally deployed. The tremendous success and growth of the wired Internet has led to a wealth of applications ranging from e-commerce to grid computing. Quality of Service (QoS), reliability, and security are necessities for many of the applications. Furthermore, the growing number of wireless devices capable of connecting to I...

2015
Mohan Malkani Sachin Shetty Peng Liu

Number of Papers published in peer-reviewed journals: Number of Papers published in non peer-reviewed journals: Final Report: Heterogeneous VM Replication: A New Approach to Intrusion Detection, Active Response, and Recovery in Cloud Data Centers Report Title The goal of this program is to enable development of novel security methods to support future Air Force and Homeland Security in Cybersec...

Journal: :بوم شناسی کشاورزی 0
مهدی نصیری محلاتی علیرضا کوچکی رضا قربانی سرور خرم دل

during the last few decades scientific researches in different fields of agricultural sciences have been grown drastically. however, there is no published study, if any, on structural analysis of the national agricultural research system of iran and setting priorities for the future. in the present study 2361 scientific papers published during the three decades in the domestic journals were sur...

2012
Morshed U. Chowdhury Noriyoshi SANO

Radio Frequency Identification (RFID) system poses serious security and privacy risks that must be carefully mitigated in order to realize the numerous benefits the technology has to offer. In this talk I am going to present different security issues required to secure a RFID system. I will also describe some desirable characteristics of RFID security protocols for use in operational distribute...

Journal: :Inf. Sci. 2015
Hua Wang Xiaohong Jiang Georgios Kambourakis

The aim of the special issue is to present leading edge work concerning privacy protection issues and security challenges in the rapidly emerging field of network‐based Big Data. Research that addresses organisational and enterprise solutions for privacy protection and information security in Big Data environments will also be presented. Both papers dealing with fundamental theory, techniques, ...

2018
Yong-Woon Kim Namin Cho Hye-Jung Jang

Objectives Information technology involves a risk of privacy violation in providing easy access to confidential information,such as personal information and medical information through the Internet. In this study, we investigated medical information security to gain a better understanding of trends in research related to medical information security. Methods We researched papers published on ...

Anuj Kumar Agarwal P.K Singh Rohit Sharma

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

Anuj Kumar Agarwal P.K Singh Rohit Sharma

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

Journal: :Wireless Personal Communications 2009
Jong Hyuk Park Han-Chieh Chao Whai-En Chen Paris Kitsos

The Future Generation Communication and Networking (FGCN) with advanced communication and networking environment is emerging for user centric consideration. In addition, the FGCN has emerged rapidly as an exciting new paradigm that includes ubiquitous, grid, and peer-to-peer computing to provide computing and communication services anytime and anywhere. Therefore, it is aim to provide users wit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید