Search

Your search keyword '"Computer Security instrumentation"' showing total 251 results

Search Constraints

Start Over You searched for: Descriptor "Computer Security instrumentation" Remove constraint Descriptor: "Computer Security instrumentation"
251 results on '"Computer Security instrumentation"'

Search Results

1. Ensuring the integrity assessment of IoT medical sensors using hesitant fuzzy sets.

2. Design of a BIST implemented AES crypto-processor ASIC.

3. An improved NFC device authentication protocol.

4. Zero-knowledge identity authentication for internet of vehicles: Improvement and application.

5. Self-Powered Multifunctional Electronic Skin for a Smart Anti-Counterfeiting Signature System.

6. A framework for secure and decentralized sharing of medical imaging data via blockchain consensus.

7. Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services : Authorized Access to Healthcare Services.

8. An Artificial Neural Network Framework for Gait-Based Biometrics.

9. Anonymity preserving and round effective three-party authentication key exchange protocol based on chaotic maps.

10. Health Care and Cybersecurity: Bibliometric Analysis of the Literature.

11. Protecting contacts against privacy leaks in smartphones.

12. Biometrics: Accessibility challenge or opportunity?

13. Ten Questions With ….

14. Getting to the Heart of HTM with a 'Back to Basics' Approach.

15. Smart Sensing Based on DNA-Metal Interaction Enables a Label-Free and Resettable Security Model of Electrochemical Molecular Keypad Lock.

16. Compact FPGA hardware architecture for public key encryption in embedded devices.

17. Controlled searching in reversibly de-identified medical imaging archives.

18. RAIN: A Bio-Inspired Communication and Data Storage Infrastructure.

19. A Mutual Authentication Framework for Wireless Medical Sensor Networks.

20. Parallel point-multiplication architecture using combined group operations for high-speed cryptographic applications.

21. Use of redundant arrays of inexpensive disks in orthodontic practice.

22. A Double Chaotic Layer Encryption Algorithm for Clinical Signals in Telemedicine.

23. A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.

24. A Selective Group Authentication Scheme for IoT-Based Medical Information System.

26. Privacy-Preserving Integration of Medical Data : A Practical Multiparty Private Set Intersection.

27. ICASME: An Improved Cloud-Based Authentication Scheme for Medical Environment.

28. Boundary-Pushing Healthcare Tech.

29. An Efficient Remote Authentication Scheme for Wireless Body Area Network.

30. An Improvement to a Multi-Client Searchable Encryption Scheme for Boolean Queries.

31. An Efficient Searchable Encryption Against Keyword Guessing Attacks for Sharable Electronic Medical Records in Cloud-based System.

32. Low Power S-Box Architecture for AES Algorithm using Programmable Second Order Reversible Cellular Automata: An Application to WBAN.

33. A Novel Reversible Multiple Medical Image Watermarking for Health Information System.

34. Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System.

35. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.

36. A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.

37. A Robust and Anonymous Two Factor Authentication and Key Agreement Protocol for Telecare Medicine Information Systems.

38. A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.

39. Analysis of Security Protocols for Mobile Healthcare.

40. m 2 -ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting.

41. Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems.

42. A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.

43. A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.

44. Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.

45. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

46. Combining FDA Labeling and LLDP for Securing Networked Medical Devices.

47. BioMEMS-based coding for secure medical diagnostic devices.

48. Secure access to patient's health records using SpeechXRays a mutli-channel biometrics platform for user authentication.

49. Evaluation of a proximity card authentication system for health care settings.

50. Physical security and IT convergence: Managing the cyber-related risks.

Catalog

Books, media, physical & digital resources