Showing 1,201 - 1,220 results of 9,720 for search '"security"', query time: 0.10s Refine Results
  1. 1201

    Wireless sensor network for fire detection with network coding to improve security and reliability by Johannes Braun, Faouzi Derbel

    Published 2025-02-01
    “…This article proposes a wireless sensor network (WSN) for fire alarm systems that leverages network coding to enhance system reliability and security. The proposed WSN is designed to comply with European standards, with a particular focus on German standards, and enables the deployment of sensor nodes that automatically construct a robust and reliable network. …”
    Get full text
    Article
  2. 1202

    Beyond full‐bit secure authenticated encryption without input‐length limitation by Akiko Inoue

    Published 2022-07-01
    Subjects: “…beyond birthday‐bound security…”
    Get full text
    Article
  3. 1203
  4. 1204
  5. 1205

    An Efficient Secure Data Aggregation Based on Homomorphic Primitives in Wireless Sensor Networks by Qiang Zhou, Geng Yang, Liwen He

    Published 2014-01-01
    “…This paper proposes a novel secure data aggregation scheme based on homomorphic primitives in WSNs (abbreviated as SDA-HP). …”
    Get full text
    Article
  6. 1206

    Secure access authentication scheme for 4G wireless network based on PCL by Li-li WANG, Tao FENG, Jian-feng MA

    Published 2012-04-01
    “…Considering the access authentication for mobile terminals in the 4G wireless network,a new secure access authentication scheme based on the self-certified public key system was designed.Then the deductive process of the scheme was derived with the protocol derivation system and its security attributes was formally proofed with protocol composition logic.By the security proof and comprehensive analysis,it is showed that the proposed scheme not only has session authentication and key confidentiality,but also can defend pseudo-base station attack and reply attack,provide the undeniable service and identity privacy.Moreover,the scheme can improve the access efficiency of the mobile terminals.…”
    Get full text
    Article
  7. 1207

    FROM THE VIEW OF THE COMMUNIST PARTY OF VIETNAM TO THE PRACTICE OF BUILDING SOCIAL SECURITY IN DANANG by Lê Đức Thọ

    Published 2017-12-01
    “…This article analyzes the views of the Communist Party of Vietnam on social security implementation in the current period; Analyzes the situation of social security in Danang and thereby suggests some solutions to improve social security for people in Danang city today.…”
    Get full text
    Article
  8. 1208
  9. 1209
  10. 1210
  11. 1211
  12. 1212

    Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device by Hyun-Woo Kim, Jun-Ho Kim, Jong Hyuk Park, Young-Sik Jeong

    Published 2014-01-01
    “…In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. …”
    Get full text
    Article
  13. 1213

    A Low-Overhead and High-Security Scan Design Based on Scan Obfuscation by Weizheng Wang, Xingxing Gong, Shuo Cai, Jiamin Liu, Xiangqi Wang

    Published 2024-01-01
    “…In this paper, we propose a low overhead secure scan design based on scan obfuscation. In this method, to increase the security of the design, we insert a set of fuse-antifuse cells (CF) controlled by the obfuscation key between the scan flip flops (SFF) and add a controller at the scan-out port. …”
    Get full text
    Article
  14. 1214

    Optimal defense strategy based on the mean field game model for cyber security by Li Miao, Lina Wang, Shuai Li, Haitao Xu, Xianwei Zhou

    Published 2019-02-01
    “…With the evolution of research on defense strategies in cyber security, the choice of an optimal strategy has become a key problem in current studies. …”
    Get full text
    Article
  15. 1215
  16. 1216

    AI-based model for securing cognitive IoT devices in advance communication systems by Akshat Gaurav, Varsha Arya, Kwok Tai Chui, Brij B. Gupta

    Published 2025-12-01
    “…These security challenges are exacerbated by IoT devices’ limited computational resources and storage capacities, rendering traditional security protocols ineffective. …”
    Get full text
    Article
  17. 1217

    Designing an internet of things laboratory to improve student understanding of secure IoT systems by A. Ravishankar Rao, Angela Elias-Medina

    Published 2024-01-01
    “…The instructional lab material has been uploaded to the web portal https://clark.center designated by the National Security Agency for dissemination. Our approach, design, and experimental validation methodology will be useful for educators, researchers, students, and organizations interested in re-skilling their workforce.…”
    Get full text
    Article
  18. 1218
  19. 1219
  20. 1220