Showing 1 - 20 results of 19,833 for search 'used security', query time: 0.17s Refine Results
  1. 1
  2. 2
  3. 3

    Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT Configurations by Dana Simian, Oana-Adriana Ticleanu, Nicolae Constantinescu

    Published 2025-03-01
    “…Computing systems grouped in subnets use distributed security models, in general, by creating session keys based on the Diffie–Hellman model, and calculating the necessary parameters for this, on each of the systems. …”
    Get full text
    Article
  4. 4
  5. 5

    Use of Attack Graphs in Security Systems by Vivek Shandilya, Chris B. Simmons, Sajjan Shiva

    Published 2014-01-01
    “…We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.…”
    Get full text
    Article
  6. 6

    Voice Security Using Hybrid Algorithm by Alyaa Abdul Majeed Haleem

    Published 2010-12-01
    “…The algorithm can hide as many as  bits of data in the image by changing one bit in each block of size . High security algorithm was achieved using three layers to make it difficult to break by attacker. …”
    Get full text
    Article
  7. 7

    A New Highly Secure Optical Image Security Technique Using Gyrator Transform for Image Security-Related Applications by L. Anusree, M. Abdul Rahiman

    Published 2022-01-01
    “…This work uses information hiding followed by image encryption using Gyrator Transform (GT) using mean gradient key-based block swapping techniques. …”
    Get full text
    Article
  8. 8

    Enhancing Data Security in Distributed Systems Using Homomorphic Encryption and Secure Computation Techniques by Parihar Bhawana, Kiran Ajmeera, Valaboju Sabitha, Rashid Syed Zahidur, Liyakat Kazi Kutubuddin Sayyad, D R Anita Sofia Liz

    Published 2025-01-01
    “…Distributed systems are now an indispensable part of modern computing, and so too must be their security, with privacy-preserving computations being in high demand. …”
    Get full text
    Article
  9. 9
  10. 10

    The Use of Digital Media and Security Precautions in Adulthood by Isabelle M. S. Haunschild, Bernhard Leipold

    Published 2023-01-01
    “…Age was positively correlated with security precautions but negatively with the use of social media. …”
    Get full text
    Article
  11. 11

    Possibilities of Using Artificial Intelligence in Security Analysis by Maciej Norbert Ciesielski

    Published 2024-12-01
    “…Objectives The aim of the article is to present the characteristics and analytical potential of artificial intelligence in the area of ​​security analysis. The text is to help answer the following research questions: • What are the characteristics of analytical imagination identified as a tool that could be used by artificial intelligence in security analyses? …”
    Get full text
    Article
  12. 12

    A Novel Information Security Framework for Securing Big Data in Healthcare Environment Using Blockchain by Lakshman Kannan Venugopal, Rajappan Rajaganapathi, Abhishek Birjepatil, Sundararajan Edwin Raja, Gnanasaravanan Subramaniam

    Published 2023-12-01
    “…The framework is based on the principles of confidentiality and immutability to ensure the security and privacy of health care data. The framework is designed to support a wide range of information sources and use cases including patient records, clinical research, medical imaging, genomic data, and pharmaceutical trials. …”
    Get full text
    Article
  13. 13

    Practical security analysis and attack strategies on permutation functions used in IoT supply chain systems by Narges Mokhtari, Amirhossein Safari, Sadegh Sadeghi, Nasour Bagheri, Samad Rostampour, Ygal Bendavid

    Published 2025-05-01
    “…Since construction costs are generally directly related to the complexity of security methods, researchers are exploring methods that provide acceptable security with minimal hardware complexity. …”
    Get full text
    Article
  14. 14

    Simulators for Processors Used in Virtualization: A Survey by Swapneel C. Mhatre, Priya Chandran

    Published 2025-01-01
    “…Sharing of resources with virtualization raised many security concerns, leading to the development of processors enhanced for security in virtualization and consequently to the need for architectural simulators for processors used in a virtualized environment. …”
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    Blockchain and Bigdata to Secure Data Using Hash and Salt Techniques by AlSelami Fudhah A.

    Published 2022-04-01
    “…Hashing algorithms are used in Blockchain to keep the data safe. Hashing algorithms like SHA 256 are used to make it more secure. …”
    Get full text
    Article
  18. 18

    Computer Monitoring and Security System Using Bluetooth Technology by Mhmood Majeed, Abdul Sattar Khidhir, Firas Yosif

    Published 2010-12-01
    “…The design and implementation of security, monitoring and controlling system with data communication based on Bluetooth technology is described. …”
    Get full text
    Article
  19. 19
  20. 20