Showing 81 - 100 results of 529 for search '"information security"', query time: 0.04s Refine Results
  1. 81
  2. 82

    The formal analysis of CC security functional components by HUANG Yuan-fei1, HE De-quan2, CHEN Ming-qi1

    Published 2003-01-01
    Subjects: “…information security…”
    Get full text
    Article
  3. 83
  4. 84
  5. 85

    Corrections to “A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review” by Zaffar Ahmed Shaikh, Fahima Hajjej, Yeter Demir Uslu, Serhat Yuksel, Hasan Dincer, Roobaea Alroobaea, Abdullah M. Baqasah, Uma Chinta

    Published 2024-01-01
    “…Presents corrections to the paper, (Corrections to “A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic Review”).…”
    Get full text
    Article
  6. 86

    Corrections to “Information Security and Artificial Intelligence-Assisted Diagnosis in an Internet of Medical Thing System (IoMTS)” by Pi-Yun Chen, Yu-Cheng Cheng, Zi-Heng Zhong, Feng-Zhou Zhang, Neng-Sheng Pai, Chien-Ming Li, Chia-Hung Lin

    Published 2025-01-01
    “…Presents corrections to the paper, (Corrections to “Information Security and Artificial Intelligence-Assisted Diagnosis in an Internet of Medical Thing System (IoMTS)”).…”
    Get full text
    Article
  7. 87
  8. 88

    Research on security of third-party tracking by Yu-qing ZHANG, Qian-ru WU, Qi-xu LIU, Ying DONG

    Published 2014-09-01
    Subjects: “…information security…”
    Get full text
    Article
  9. 89
  10. 90
  11. 91
  12. 92
  13. 93
  14. 94

    TPCM-based trusted PXE boot method for servers by Guojie LIU, Jianbiao ZHANG

    Published 2020-12-01
    Subjects: “…information security…”
    Get full text
    Article
  15. 95
  16. 96

    Adaptive JPEG steganography based on distortion cost updating by Guang-ming TANG, Yi SUN, Xiao-yu XU, Yu WANG

    Published 2017-09-01
    Subjects: “…information security…”
    Get full text
    Article
  17. 97

    Study on enhancing integrity for BLP model by LIU Yan-ming, DONG Qing-kuan, LI Xiao-ping

    Published 2010-01-01
    Subjects: “…information security…”
    Get full text
    Article
  18. 98
  19. 99
  20. 100