Results 101 to 110 of about 1,916,317 (370)
A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs [PDF]
Programmers use security APIs to embed security into the applications they develop. Security vulnerabilities get introduced into those applications, due to the usability issues that exist in the security APIs. Improving usability of security APIs would contribute to improve the security of applications that programmers develop. However, currently there
arxiv
Computationally Bounded Robust Compilation and Universally Composable Security [PDF]
Universal Composability (UC) is the gold standard for cryptographic security, but mechanizing proofs of UC is notoriously difficult. A recently-discovered connection between UC and Robust Compilation (RC)$\unicode{x2014}$a novel theory of secure compilation$\unicode{x2014}$provides a means to verify UC proofs using tools that mechanize equality results.
arxiv +1 more source
Abstract The Mammography Quality Standards Act (MQSA) sets quality standards for displays used to interpret mammography images. With the shift to digital mammography and the widespread use of remote reading workstations (RWS), updated quality management (QM) programs are needed to ensure consistent image presentation and accurate interpretation.
Rebecca Milman+12 more
wiley +1 more source
FBMP-IDS: FL-Based Blockchain-Powered Lightweight MPC-Secured IDS for 6G Networks
The coming 6G wireless network is poised to achieve unprecedented data rates, latency, and integration with newer technologies like AI and IoE. On the other hand, along with this kind of growth in the AI domain and the large-scale connectivity in 6G.
Sabrina Sakraoui+5 more
doaj +1 more source
Social engineering: Concepts, Techniques and Security Countermeasures [PDF]
The purpose of this report is to research the topic called Social Engineering in Cyber Security and present the explanation of the meaning, concepts, techniques, and security countermeasures of Social Engineering based on factual academic research.
arxiv
Private Secure Coded Computation [PDF]
We introduce a variation of coded computation that ensures data security and master's privacy against workers, which is referred to as private secure coded computation. In private secure coded computation, the master needs to compute a function of its own dataset and one of the datasets in a library exclusively shared by external workers.
Minchul Kim, Jungwoo Lee
openaire +3 more sources
Abstract Recurrent imaging is an essential tool for patient care but with an attendant dose from radiation exposure. Recurrent imaging has been the subject of increasing scrutiny and debate based largely on the risk from increasing cumulative doses. However, the accountability for and actions with recurrent imaging as a special component in the general
Donald P. Frush+8 more
wiley +1 more source
Part-Based Enhanced Super Resolution Network for Low-Resolution Person Re-Identification
Person re-identification (REID) is an important task in video surveillance and forensics applications. Many previous works often build models on the assumption that they have same resolution cross different camera views, while it is divorced from reality.
Yan Ha+5 more
doaj +1 more source
CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing [PDF]
Cloud computing has been adopted widely, providing on-demand computing resources to improve perfornance and reduce the operational costs. However, these new functionalities also bring new ways to exploit the cloud computing environment. To assess the security of the cloud, graphical security models can be used, such as Attack Graphs and Attack Trees ...
arxiv
Security of computer communication [PDF]
n ...
openaire +2 more sources