Showing 61 - 80 results of 529 for search '"information security"', query time: 0.09s Refine Results
  1. 61
  2. 62
  3. 63
  4. 64

    Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras by Zhenlong Man, Jianmeng Liu, Fan Zhang, Xiangfu Meng

    Published 2025-02-01
    “…In order to solve the problems of key redundancy, transmission and storage security and the difficulty of realizing the one-time-secret mode in image encryption algorithm, this paper proposes a cloud dynamic public key information security scheme based on elliptic curve and primitive Pythagoras. …”
    Get full text
    Article
  5. 65
  6. 66
  7. 67
  8. 68

    Approach of information security assessment for ATM system based on improved BP model of artificial neural network by WU Zhi-jun, WANG Lu, SHI Rong

    Published 2011-01-01
    “…ATM system was divided into 3 layers for the purpose of evaluating its information security.An evaluation model was proposed by using a 3-layer artificial neural network(ANN) based on improved BP model.The major information security indicators of ATM system were used as the training samples,which were adapted to find the intrinsic links between the input and output by learning and training process.An experiment was conducted by using the well-trained ANN network to evaluate the security of ATM system.The experimental results show that the proposed ANN evaluation model can indicate the practical running status of ATM system precisely.It is highly adaptive and fault-tolerant.…”
    Get full text
    Article
  9. 69
  10. 70

    Review of domestic and international financial security by Lian-peng LI, Hong LUO

    Published 2017-02-01
    Subjects: “…financial information security…”
    Get full text
    Article
  11. 71

    Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition by Cheng-cheng MAI, Bo CHEN, Jia-kun ZHOU, Ling YU

    Published 2016-10-01
    “…A security capacity assessment method based on security behavior ontology,was proposed to collect users' be-havior data from their smartphones under unconscious condition to solve the problem of detecting mobile phone users' real existing insecure behaviors.A security behavior ontology was set up for formalizing the phone,message,network and App behavior data of mobile phone users and relevant rules were also set down for determining and associating inse-cure actions.Referring to the notion of attack graph,an insecure behavior detection algorithm was proposed based on behavior association graph for analyzing the paths of insecure behaviors dynamically.Furthermore,a competency model of information security capability assessment was presented for realizing the quantitative evaluation of information secu-rity capability of users.The experiment results prove the effectiveness of present competency model for insecure behavior path detection and security ability assessment.…”
    Get full text
    Article
  12. 72
  13. 73
  14. 74

    Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS) by Pi-Yun Chen, Yu-Cheng Cheng, Zi-Heng Zhong, Feng-Zhou Zhang, Neng-Sheng Pai, Chien-Ming Li, Chia-Hung Lin

    Published 2024-01-01
    “…In a public channel, IoMTS must ensure information security for protection against hacker attacks. …”
    Get full text
    Article
  15. 75
  16. 76

    Design of multi-key encryption method by Yuqing ZHONG, Hao WANG, Zebing LIN, Min WANG, Liye CHEN

    Published 2020-11-01
    Subjects: “…information security…”
    Get full text
    Article
  17. 77

    The Role of the Organization in Promoting Information Security–Related Behavior Among Resident Physicians in Hospitals in Germany: Cross-Sectional Questionnaire Study by Judith Kraushaar, Sabine Bohnet-Joschko

    Published 2025-01-01
    “…ObjectiveThis study aimed to explore the impact of specific job demands and resources on resident physicians’ information security–related compliance in hospitals through the mediating role of work engagement and information security–related awareness. …”
    Get full text
    Article
  18. 78
  19. 79
  20. 80