Showing 1,341 - 1,360 results of 9,720 for search '"security"', query time: 0.08s Refine Results
  1. 1341

    Wireless body area network: Architecture and security mechanism for healthcare using internet of things by Arun Kumar, Ritu Dewan, Wisam Subhi Al-Dayyeni, Bharat Bhushan, Jayant Giri, Sardar MN Islam, Ahmed Elaraby

    Published 2025-01-01
    “…The data generated by small sensor devices need strong security methods for secure transmission over a public network. …”
    Get full text
    Article
  2. 1342

    Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks by B. Madhusudhanan, S. Chitra, C. Rajan

    Published 2015-01-01
    “…In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. …”
    Get full text
    Article
  3. 1343
  4. 1344
  5. 1345
  6. 1346

    Unified operation monitoring and security warning platform based on big data in energy group by Jing WANG, Kunlun GAO, Chaoyi BIAN, Xiao LIANG

    Published 2018-05-01
    “…With the increasing of information assets of energy group,in order to effectively cope with information security risks,using the big data and the intersecting confirmation mechanics of multi-source data,a monitoring and security warning platform was designed for information devices and application systems in energy group.By the global analysis of big multi-source data,the real-time awareness of risk and situation could be achieved,which was valuable for the progress of operation and management level of information system and timely warning of the spread of information risk to the power system.…”
    Get full text
    Article
  7. 1347
  8. 1348

    A New Solution of Privacy-Preserving Public Auditing Scheme for Cloud Storage Security by Shaohui Wang, Danwei Chen, Zhiwei Wang, Suqin Chang

    Published 2012-09-01
    “…In this paper, after giving a new construction of a recently proposed primitive named aggregatable signature based broadcast encryption scheme, we present an efficient public auditing scheme with privacy property. The new scheme is secure in the random oracle model and has less computation cost than existing auditing scheme with privacy property.…”
    Get full text
    Article
  9. 1349
  10. 1350

    A Secure Privacy-Preserving Data Aggregation Model in Wearable Wireless Sensor Networks by Changlun Zhang, Chao Li, Jian Zhang

    Published 2015-01-01
    “…So, privacy preservation is becoming an increasingly important issue in security data aggregation. In this paper, we propose a security privacy-preserving data aggregation model, which adopts a mixed data aggregation structure. …”
    Get full text
    Article
  11. 1351
  12. 1352
  13. 1353
  14. 1354

    Strong incidence domination in some operations of fuzzy incidence graphs and application in security allocation by Kavya R. Nair, M. S. Sunitha

    Published 2024-12-01
    “…Additionally, the paper discusses an application of SID in security allocation.…”
    Get full text
    Article
  15. 1355
  16. 1356
  17. 1357

    BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid by Wei Ren, Jun Song, Min Lei, Yi Ren

    Published 2011-01-01
    “…BVS can achieve forward and backward security and only relies on hash functions. Security analysis justifies that the proposed schemes, especially BVS, can attain the security goals with low computation and storage cost.…”
    Get full text
    Article
  18. 1358

    Improved Population Intelligence Algorithm and BP Neural Network for Network Security Posture Prediction by Yueying Li, Feng Wu

    Published 2023-01-01
    “…To address the problems of low prediction accuracy and slow convergence of the network security posture prediction model, a population intelligence optimization algorithm is proposed to improve the network security posture prediction model of the BP neural network. …”
    Get full text
    Article
  19. 1359
  20. 1360