Search

Your search keyword '"Computer security model"' showing total 12,677 results

Search Constraints

Start Over You searched for: Descriptor "Computer security model" Remove constraint Descriptor: "Computer security model"
12,677 results on '"Computer security model"'

Search Results

1. Ambassy: A Runtime Framework to Delegate Trusted Applications in an ARM/FPGA Hybrid System

2. A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control

3. Autonomic computing system: Threats, security issues and an efficient approach for self protection

4. A Cloud-Based Computing Framework for Artificial Intelligence Innovation in Support of Multidomain Operations

5. Lightweight Public Key Authenticated Encryption With Keyword Search Against Adaptively-Chosen-Targets Adversaries for Mobile Devices

6. SeUpdate: Secure Encrypted Data Update for Multi-User Environments

7. Revocable Attribute-Based Encryption With Data Integrity in Clouds

8. Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain

9. ABAC-Based Security Model for DDS

10. Anonymous Authenticated Key Agreement and Group Proof Protocol for Wearable Computing

11. Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud

12. Dispelling myths on superposition attacks: formal security model and attack analyses

13. A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks

14. A Secure Clinical Diagnosis With Privacy-Preserving Multiclass Support Vector Machine in Clouds

15. Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage

16. A two-tier Blockchain framework to increase protection and autonomy of smart objects in the IoT

17. Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things

18. Combinatorial Analysis for Securing IoT-Assisted Industry 4.0 Applications From Vulnerability-Based Attacks

19. Adaptive Secure Nearest Neighbor Query Processing Over Encrypted Data

20. Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization

21. Provable Data Possession with Outsourced Data Transfer

22. Efficient public-key encryption with equality test from lattices

23. Profit maximization for security-aware task offloading in edge-cloud environment

24. Authentication and key establishment protocol from supersingular isogeny for mobile environments

25. Generic construction for tightly-secure signatures from discrete log

26. Privacy-preserving voluntary-tallying leader election for internet of things

27. Comprehensive Security: The Opportunities and Challenges of Incorporating Environmental Threats in Security Policy

28. Constructing Financial Information Security Model Based on PCA and Optimized BP Neural Network

29. Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception

30. Smart factory: security issues, challenges, and solutions

31. Hybrid Trusted/Untrusted Relay-Based Quantum Key Distribution Over Optical Backbone Networks

32. Two-Pass Privacy Preserving Authenticated Key Agreement Scheme for Smart Grid

33. A proposed authentication and group-key distribution model for data warehouse signature, DWS framework

34. Improving IoT Privacy, Data Protection and Security Concerns

35. A Novel Pairing-Free Lightweight Authentication Protocol for Mobile Cloud Computing Framework

36. SQL Server Security Model

37. Automating Maintenance Routines

38. A Study of Malware Propagation Dynamics in Wireless Sensor Network Using Spatially Correlated Security Model

39. Public key encryption with filtered equality test revisited

40. A Provenance-Aware Distributed Trust Model for Resilient Unmanned Aerial Vehicle Networks

41. Continuous Probabilistic Skyline Query for Secure Worker Selection in Mobile Crowdsensing

42. SUPnP: Secure Access and Service Registration for UPnP-Enabled Internet of Things

43. Eficacia y eficiencia de la seguridad de las redes LAN. Cantón Pasaje

44. Analysis of formal models for access control and specific features of their applicability to databases

45. Basic principles and results of comparison of electronic signatures properties of the postquantum period based on algebraic lattices

46. Quantitative Analysis of Opacity in Cloud Computing Systems

47. Fully Accountable Data Sharing for Pay-as-You-Go Cloud Scenes

48. Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures

49. Security-Aware Dynamic Scheduling for Real-Time Optimization in Cloud-Based Industrial Applications

50. Intelligent Internet of Things System for Smart Home Optimal Convection

Catalog

Books, media, physical & digital resources