Showing 961 - 980 results of 9,720 for search '"Securities ', query time: 0.12s Refine Results
  1. 961
  2. 962
  3. 963

    Health Monitoring System for Nursing Homes with Lightweight Security and Privacy Protection by Yu’e Jiang, Jiaxiang Liu

    Published 2017-01-01
    “…So this paper proposed a health monitoring system with lightweight security and privacy protection for nursing homes. …”
    Get full text
    Article
  4. 964

    Secure Microprocessor-Controlled Prosthetic Leg for Elderly Amputees: Preliminary Results by S. Krut, Ch. Azevedo Coste, P. Chabloz

    Published 2011-01-01
    “…Our artificial knee has been designed to fulfill the specific requirements of this population in terms of capabilities, transfer assistance, security, intuitiveness, simplicity of use, and types of physical activity to be performed. …”
    Get full text
    Article
  5. 965
  6. 966
  7. 967
  8. 968
  9. 969
  10. 970
  11. 971

    New construction of secure range query on encrypted data in cloud computing by Shao-hui WANG, Zhi-jie HAN, Dan-wei CHEN, Ru-chuan WANG

    Published 2015-02-01
    “…To solve the information leakage problem resulting from several assertions of previous range query solutions,there is a secure range query scheme with one assertion (SRQSAE scheme),and the scheme is claimed to be secure against ciphertext-only attack.The security analysis on SRQSAE scheme is presented,and it shows SRQSAE scheme can not hide the size of search keyword.A new scheme of secure range query on encrypted data is proposed through introducing random numbers in the generation of search index and trapdoor.The new scheme can provide the privacy guarantee on search range and search keyword,and it achieves high level needs of security without losing efficiency.…”
    Get full text
    Article
  12. 972
  13. 973
  14. 974

    Access to Network Login by Three-Factor Authentication for Effective Information Security by S. Vaithyasubramanian, A. Christy, D. Saravanan

    Published 2016-01-01
    “…In this way managing additional secret key includes an additional layer of security.…”
    Get full text
    Article
  15. 975
  16. 976

    An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment by Vinothkumar Muthurajan, Balaji Narayanasamy

    Published 2016-01-01
    “…Cloud computing requires the security upgrade in data transmission approaches. In general, key-based encryption/decryption (symmetric and asymmetric) mechanisms ensure the secure data transfer between the devices. …”
    Get full text
    Article
  17. 977
  18. 978

    A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects by Hui He, Dongyan Zhang, Min Liu, Weizhe Zhang, Dongmin Gao

    Published 2014-01-01
    “…Software security defects have a serious impact on the software quality and reliability. …”
    Get full text
    Article
  19. 979
  20. 980