DIKUL - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

48 49 50
hits: 99,111
491.
  • Design of a Secure Medical ... Design of a Secure Medical Data Sharing Scheme Based on Blockchain
    Cheng, Xu; Chen, Fulong; Xie, Dong ... Journal of medical systems, 02/2020, Volume: 44, Issue: 2
    Journal Article
    Peer reviewed

    With the rapid development of technologies such as artificial intelligence, blockchain, cloud computing, and big data, Medical Cyber Physical Systems (MCPS) are increasingly demanding data security, ...
Full text
Available for: UL, VSZLJ
492.
  • Aggregation-induced-emissio... Aggregation-induced-emission-active vinamidinium salts with tunable emissions, reversible mechanochromic response and the application in data-security protection
    Hu, Jinyang; Wang, Jia; Liu, Rui ... Dyes and pigments, June 2018, 2018-06-00, Volume: 153
    Journal Article
    Peer reviewed

    The development of aggregation-induced-emission (AIE)-active and reversible mechanochromic fluorescent organic materials has been of great interest in recent years because of their potential and ...
Full text
Available for: UL
493.
  • A Secure and Efficient Fram... A Secure and Efficient Framework to Read Isolated Smart Grid Devices
    Kewei Sha; Alatrash, Naif; Zhiwei Wang IEEE transactions on smart grid, 11/2017, Volume: 8, Issue: 6
    Journal Article
    Peer reviewed

    With increasing deployments of smart grid systems, a large quantity of energy usage and grid status data have been collected by smart grid devices like smart meters. To secure these critical and ...
Full text
Available for: UL
494.
  • Online social networks secu... Online social networks security and privacy: comprehensive review and analysis
    Jain, Ankit Kumar; Sahoo, Somya Ranjan; Kaubiyal, Jyoti Complex & intelligent systems, 10/2021, Volume: 7, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    With fast-growing technology, online social networks (OSNs) have exploded in popularity over the past few years. The pivotal reason behind this phenomenon happens to be the ability of OSNs to provide ...
Full text
Available for: UL

PDF
495.
  • Blockchain Technology: Secu... Blockchain Technology: Security Issues, Healthcare Applications, Challenges and Future Trends
    Wenhua, Zhang; Qamar, Faizan; Abdali, Taj-Aldeen Naser ... Electronics (Basel), 01/2023, Volume: 12, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Blockchain technology provides a data structure with inherent security properties that include cryptography, decentralization, and consensus, which ensure trust in transactions. It covers widely ...
Full text
Available for: UL
496.
  • Ensuring data storage secur... Ensuring data storage security in Cloud Computing
    Cong Wang; Qian Wang; Kui Ren ... 2009 17th International Workshop on Quality of Service, 2009-July
    Conference Proceeding
    Open access

    Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel ...
Full text
Available for: UL

PDF
497.
  • Defending Against Advanced ... Defending Against Advanced Persistent Threats Using Game-Theory
    Rass, Stefan; König, Sandra; Schauer, Stefan PloS one, 01/2017, Volume: 12, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a ...
Full text
Available for: UL

PDF
498.
  • Intrusion Prevention Framew... Intrusion Prevention Framework for Secure Routing in WSN-Based Mobile Internet of Things
    Haseeb, Khalid; Islam, Naveed; Almogren, Ahmad ... IEEE access, 2019, Volume: 7
    Journal Article
    Peer reviewed
    Open access

    The infrastructure of wireless sensor networks (WSN) is structured in an ad-hoc manner and organized nodes reporting the events to the Base Station (BS). A WSN is integrated with smart technologies ...
Full text
Available for: UL

PDF
499.
  • MetaCloudDataStorage Archit... MetaCloudDataStorage Architecture for Big Data Security in Cloud Computing
    Manogaran, Gunasekaran; Thota, Chandu; Kumar, M. Vijay Procedia computer science, 2016, 2016-00-00, Volume: 87
    Journal Article
    Peer reviewed
    Open access

    The cloud is increasingly being used to store and process the big data. Many researchers have been trying to protect big data in cloud computing environment. Traditional security mechanisms using ...
Full text
Available for: UL

PDF
500.
  • Homomorphic Encryption for ... Homomorphic Encryption for Security of Cloud Data
    Potey, Manish M.; Dhote, C.A.; Sharma, Deepak H. Procedia computer science, 2016, 2016-00-00, Volume: 79
    Journal Article
    Peer reviewed
    Open access

    Cloud computing is a broad and diverse phenomenon. Users are allowed to store large amount of data on cloud storage for future use. The various security issues related to data security, privacy, ...
Full text
Available for: UL

PDF

You have reached the maximum number of search results that are displayed.

  • For better performance, the search offers a maximum of 1,000 results per query (or 50 pages if the option 10/page is selected).
  • Consider using result filters or changing the sort order to explore your results further.
48 49 50
hits: 99,111

Load filters