Search

Your search keyword '"Computer security model"' showing total 12,677 results

Search Constraints

Start Over You searched for: Descriptor "Computer security model" Remove constraint Descriptor: "Computer security model"
12,677 results on '"Computer security model"'

Search Results

51. Simple and efficient FE for quadratic functions

52. Restructuring and Automation of Security Model for Sustainable Development in Nigeria

53. Authenticated logarithmic-order supersingular isogeny group key exchange

54. ISM-AC: an immune security model based on alert correlation and software-defined networking

55. Blockchain-Based Security Framework for a Critical Industry 4.0 Cyber-Physical System

56. Security and Energy-aware Collaborative Task Offloading in D2D communication

57. User authentication using Blockchain based smart contract in role-based access control

58. Confronting DDoS Attacks in Software-Defined Wireless Sensor Networks based on Evidence Theory

59. Secure and Efficient Image Cryptography Technique using Choas and DNA Encoding Methodology

60. Linear feedback shift register and integer theory: a state-of-art approach in security issues over e-commerce

61. Secured Multi-Party Data Release on Cloud for Big Data Privacy-Preserving Using Fusion Learning

62. Analysis of formal models for ensuring data integrity and their applicability to databases

63. A Secure Communicating MD5 based DICOM Annotation tool

64. Scalable Trust Management model for Machine To Machine communication in Internet of Things using Fuzzy approach

65. Attribute-based proxy re-encryption from standard lattices

67. Definitions and Security of Quantum Electronic Voting

68. Users’ attitude on perceived security of enterprise systems mobility: an empirical study

69. Zero Trust Federation: Sharing Context under User Control towards Zero Trust in Identity Federation

70. SearchBC: A Blockchain-Based PEKS Framework for IoT Services

71. BDKM: A Blockchain-Based Secure Deduplication Scheme with Reliable Key Management

72. Dynamic Reciprocal Authentication Protocol for Mobile Cloud Computing

73. Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability

74. Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model

75. Network Security Model Based on Active and Passive Defense Hybrid Strategy

76. A metamorphic cryptography approach towards securing medical data using chaotic sequences and Ramanujan conjecture

77. Hybrid Secure Equivalent Computing Model for Distributed Computing Applications

78. IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability

79. Blockchain-based multi-party proof of assets with privacy preservation

80. Attack and defense in the layered cyber-security model and their (1 ± ϵ)-approximation schemes

81. Mutual heterogeneous signcryption schemes with different system parameters for 5G network slicings

82. Self-adaptive and secure mechanism for IoT based multimedia services: a survey

83. Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning

84. Security in Next Generation Mobile Payment Systems: A Comprehensive Survey

85. Comments on 'Efficient Public Verification of Data Integrity for Cloud Storage Systems From Indistinguishability Obfuscation'

86. Security Threats and Artificial Intelligence Based Countermeasures for Internet of Things Networks: A Comprehensive Survey

87. A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges

88. Performance Analysis of the Hybrid MQTT/UMA and Restful IoT Security Model

89. K-Time Modifiable and Epoch-Based Redactable Blockchain

90. Analysis of Multiplicative Low Entropy Masking Schemes Against Correlation Power Attack

91. Security Model of Authentication at the Physical Layer and Performance Analysis over Fading Channels

92. Efficient All-or-Nothing Public Key Encryption With Authenticated Equality Test

93. Contemporary trends in privacy-preserving data pattern recognition

94. Integrity Auditing for Multi-Copy in Cloud Storage Based on Red-Black Tree

95. Outsourcing Proofs of Retrievability

97. Integrating RBAC, MIC, and MLS in Verified Hierarchical Security Model for Operating System

98. Certificateless Homomorphic Signature Scheme for Network Coding

99. TO THE PROBLEM OF DEVELOPING A SECURITY MODEL ON THE BASIS OF INTELLECTUAL AGENTS IN THE CORPORATE INFORMATION SYSTEM

100. The Group Key Agreement Protocol Based on Multi-Dimensional Virtual Permutation

Catalog

Books, media, physical & digital resources