Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2
zadetkov: 19
1.
  • An overview of brain-like c... An overview of brain-like computing: Architecture, applications, and future trends
    Ou, Wei; Xiao, Shitao; Zhu, Chengyu ... Frontiers in neurorobotics, 11/2022, Letnik: 16
    Journal Article
    Recenzirano
    Odprti dostop

    With the development of technology, Moore's law will come to an end, and scientists are trying to find a new way out in brain-like computing. But we still know very little about how the brain works. ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
2.
  • Intrusion Detection Model f... Intrusion Detection Model for Internet of Vehicles Using GRIPCA and OWELM
    Zhang, Kaijun; Yang, Jiayu; Shao, Yangfei ... IEEE access, 01/2024, Letnik: 12
    Journal Article
    Recenzirano
    Odprti dostop

    With the rapid development of the Internet of Vehicles, a large amount of vehicle network data is being generated. The large amount of data presents network communication security challenges. ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
3.
  • A framework for efficient c... A framework for efficient cross-chain token transfers in blockchain networks
    Guo, Hongyu; Liang, Haozhe; Huang, Ju ... Journal of King Saud University. Computer and information sciences, February 2024, 2024-02-00, 2024-02-01, Letnik: 36, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    The proliferation of blockchain technology has resulted in diverse token standards, posing challenges for compatibility, security, and performance in existing cross-chain bridges. This paper ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
4.
  • Ensuring data confidentiali... Ensuring data confidentiality via plausibly deniable encryption and secure deletion – a survey
    Zhang, Qionglu; Jia, Shijie; Chang, Bing ... Cybersecurity (Singapore), 5/6, Letnik: 1, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Ensuring confidentiality of sensitive data is of paramount importance, since data leakage may not only endanger data owners’ privacy, but also ruin reputation of businesses as well as violate various ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
5.
  • An overview on cross-chain:... An overview on cross-chain: Mechanism, platforms, challenges and advances
    Ou, Wei; Huang, Shiying; Zheng, Jingjing ... Computer networks (Amsterdam, Netherlands : 1999), 12/2022, Letnik: 218
    Journal Article
    Recenzirano
    Odprti dostop

    •Policy support and research status of cross-chain technology are illustrated.•Essential cross-chain machanisms and representive cross-chain projects are summarized, and a comparative analysis is ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
6.
  • A zero trust and blockchain... A zero trust and blockchain-based defense model for smart electric vehicle chargers
    Li, Peirong; Ou, Wei; Liang, Haozhe ... Journal of network and computer applications, April 2023, 2023-04-00, Letnik: 213
    Journal Article
    Recenzirano
    Odprti dostop

    Electric vehicles (EVs) have rapidly developed over the last decade due to their environmental benefits. As a key component of EVs, electric vehicle chargers are becoming increasingly digital and ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
7.
  • An attribute-encryption-bas... An attribute-encryption-based cross-chain model in urban internet of vehicles
    Chen, Mao; Jiang, Yuan; Huang, Ju ... Computers & electrical engineering, April 2024, 2024-04-00, Letnik: 115
    Journal Article
    Recenzirano
    Odprti dostop

    With the maturity of Internet of Vehicles (IoV) technology and blockchain technology, numerous application scenarios have emerged, including urban Internet of Vehicles, Highway Internet of Vehicles, ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
8.
  • A data sharing method for r... A data sharing method for remote medical system based on federated distillation learning and consortium blockchain
    Li, Ning; Zhang, Ruijie; Zhu, Chengyu ... Connection science, 12/2023, Letnik: 35, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    With the development of Medical Internet of Things (MIoT) technology and the global COVID-19 pandemic, hospitals gain access to patients' health data from remote wearable medical equipment. Federated ...
Celotno besedilo
Dostopno za: DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
9.
  • MDEFTL: Incorporating Multi... MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer
    Jia, Shijie; Zhang, Qionglu; Xia, Luning ... IEEE transactions on dependable and secure computing, 09/2022, Letnik: 19, Številka: 5
    Journal Article

    Conventional encryption solutions cannot defend against a coercive attacker who can capture the device owner, and force the owner to disclose keys used for decrypting sensitive data. To defend ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
10.
  • Enhancing the Security of M... Enhancing the Security of Mobile Device Management with Seccomp
    Niu, Yingjiao; Wang, Yuewu; Jia, Shijie ... Journal of physics. Conference series, 09/2020, Letnik: 1646, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Mobile devices today have been increasingly used to store and process sensitive information, and Mobile Device Management (MDM) solution is provided in Android systems to manage the mobile devices. ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
1 2
zadetkov: 19

Nalaganje filtrov