Showing 1,221 - 1,240 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 1221
  2. 1222
  3. 1223
  4. 1224

    Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device by Hyun-Woo Kim, Jun-Ho Kim, Jong Hyuk Park, Young-Sik Jeong

    Published 2014-01-01
    “…In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. …”
    Get full text
    Article
  5. 1225

    A Low-Overhead and High-Security Scan Design Based on Scan Obfuscation by Weizheng Wang, Xingxing Gong, Shuo Cai, Jiamin Liu, Xiangqi Wang

    Published 2024-01-01
    “…In this paper, we propose a low overhead secure scan design based on scan obfuscation. In this method, to increase the security of the design, we insert a set of fuse-antifuse cells (CF) controlled by the obfuscation key between the scan flip flops (SFF) and add a controller at the scan-out port. …”
    Get full text
    Article
  6. 1226

    Optimal defense strategy based on the mean field game model for cyber security by Li Miao, Lina Wang, Shuai Li, Haitao Xu, Xianwei Zhou

    Published 2019-02-01
    “…With the evolution of research on defense strategies in cyber security, the choice of an optimal strategy has become a key problem in current studies. …”
    Get full text
    Article
  7. 1227
  8. 1228

    AI-based model for securing cognitive IoT devices in advance communication systems by Akshat Gaurav, Varsha Arya, Kwok Tai Chui, Brij B. Gupta

    Published 2025-12-01
    “…These security challenges are exacerbated by IoT devices’ limited computational resources and storage capacities, rendering traditional security protocols ineffective. …”
    Get full text
    Article
  9. 1229

    Designing an internet of things laboratory to improve student understanding of secure IoT systems by A. Ravishankar Rao, Angela Elias-Medina

    Published 2024-01-01
    “…The instructional lab material has been uploaded to the web portal https://clark.center designated by the National Security Agency for dissemination. Our approach, design, and experimental validation methodology will be useful for educators, researchers, students, and organizations interested in re-skilling their workforce.…”
    Get full text
    Article
  10. 1230
  11. 1231
  12. 1232
  13. 1233
  14. 1234
  15. 1235
  16. 1236
  17. 1237
  18. 1238
  19. 1239
  20. 1240