Showing 1,941 - 1,960 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 1941

    Resilient Multipath Routing Mechanism Based on Clustering with Intrusion Tolerance by Shukui Zhang, Hongyan Zuo, Jianxi Fan, Juncheng Jia

    Published 2013-11-01
    “…However, in many special fields, network security is a basic and important factor which we must concern for. …”
    Get full text
    Article
  2. 1942

    Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network by Ning Xi, Jianfeng Ma, Cong Sun, Yulong Shen, Tao Zhang

    Published 2013-05-01
    “…Usually multiple nodes located in different regions provide data with different security levels, and it is critical to ensure the security of the information flow in the composite services. …”
    Get full text
    Article
  3. 1943

    Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments by Youngseok Chung, Seokjin Choi, Dongho Won

    Published 2015-11-01
    “…Authentication and privacy protection are important security mechanisms for keeping things safe in the Internet of Things environments. …”
    Get full text
    Article
  4. 1944

    An Efficient Biometric Authentication Protocol for Wireless Sensor Networks by Ohood Althobaiti, Mznah Al-Rodhaan, Abdullah Al-Dhelaan

    Published 2013-05-01
    “…Wireless sensor networks (WSNs) are spreading rapidly due to their flexibility to communicate which demands a secure environment. The most important requirements of WSN security are confidentiality, authentication, and integrity. …”
    Get full text
    Article
  5. 1945

    Systematic Literature Review on Cybersecurity Issues in the Smart Home Environment by Rofiq Fauzi, Puspa Ira Dewi Candra Wulan, Danis Putra Perdana

    Published 2024-12-01
    “…Method A literature study was conducted to examine cyber security in Smart Homes, focusing on vulnerability assessment, privacy, threat mitigation, and policy regulations. …”
    Get full text
    Article
  6. 1946
  7. 1947
  8. 1948
  9. 1949
  10. 1950
  11. 1951

    Real-Time Mouse Data Protection Method Using GANs for Image-Based User Authentication Based on GetCursorPos() and SetCursorPos() Functions by Jinwook Kim, Kyungroul Lee, Hanjo Jeong

    Published 2025-01-01
    “…However, these approaches also face significant security challenges due to the potential exposure of mouse input data. …”
    Get full text
    Article
  12. 1952

    Review of communication optimization methods in federated learning by YANG Zhikai, LIU Yaping, ZHANG Shuo, SUN Zhe, YAN Dingyu

    Published 2024-12-01
    “…With the development and popularization of artificial intelligence technologies represented by deep learning, the security issues they continuously expose have become a huge challenge affecting cyberspace security. …”
    Get full text
    Article
  13. 1953
  14. 1954

    Reputation-Based Leader Selection Consensus Algorithm with Rewards for Blockchain Technology by Munir Hussain, Amjad Mehmood, Muhammad Altaf Khan, Rabia Khan, Jaime Lloret

    Published 2025-01-01
    “…Blockchain technology is an emerging decentralized and distributed technology that can maintain data security. It has the potential to transform many sectors completely. …”
    Get full text
    Article
  15. 1955

    Mutual-information of meteorological-soil and spatial propagation: Agricultural drought assessment based on network science by Qingzhi Wen, Xinjun Tu, Lei Zhou, Vijay P Singh, Xiaohong Chen, Kairong Lin

    Published 2025-01-01
    “…Agricultural drought causes serious harm to food security and vegetation ecosystems, and challenges the entire food-water-energy-health-environment nexus, complicating, in turn, management strategies. …”
    Get full text
    Article
  16. 1956
  17. 1957
  18. 1958
  19. 1959
  20. 1960