Results 111 to 120 of about 5,973,902 (354)
CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing [PDF]
Cloud computing has been adopted widely, providing on-demand computing resources to improve perfornance and reduce the operational costs. However, these new functionalities also bring new ways to exploit the cloud computing environment. To assess the security of the cloud, graphical security models can be used, such as Attack Graphs and Attack Trees ...
arxiv
Computer-aided proofs for multiparty computation with active security [PDF]
Secure multi-party computation (MPC) is a general cryptographic technique that allows distrusting parties to compute a function of their individual inputs, while only revealing the output of the function.
Haagh, Helene+4 more
core +2 more sources
Development of a generic focal spot measurement method suitable for bore‐type linacs
Abstract Purpose In linear accelerators, deviations in the x‐ray focal spot position significantly affect the accuracy of radiation therapy. However, as the focal spot position in bore‐type linac systems such as the Radixact system, cannot be assessed using conventional methods, a new evaluation method is required.
Hidetoshi Shimizu+5 more
wiley +1 more source
Security Architecture for Cloud-Based Command and Control System in IoT Environment
With the development of the fourth industrial technology, such as the Internet of Things (IoT) and cloud computing, developed countries including the U.S.
Jahoon Koo+3 more
doaj +1 more source
Security in Brain-Computer Interfaces
Brain-Computer Interfaces (BCIs) have significantly improved the patients’ quality of life by restoring damaged hearing, sight, and movement capabilities.
Sergio López Bernal+4 more
semanticscholar +1 more source
A Modified ck-Secure Sum Protocol for Multi-Party Computation [PDF]
Secure Multi-Party Computation (SMC) allows multiple parties to compute some function of their inputs without disclosing the actual inputs to one another. Secure sum computation is an easily understood example and the component of the various SMC solutions.
arxiv
Abstract Purpose Breast cancer is a neoplastic disease with high prevalence among women. Radiotherapy is one of the principal treatment modalities for this disease, but it poses significant challenges. This study aimed to compare and evaluate the technical and dosimetric performance of conventional C‐arm linac systems and a new design, Halcyon, in the ...
Mustafa Çağlar+8 more
wiley +1 more source
The byproduct of today’s massive interconnectivity is that basically nothing and no-one is immune to cyber attacks any longer. Sadly, this can be demonstrated rather trivially.
Etalle, Sandro
core +2 more sources
Abstract Purpose In radiation oncology, the integration and registration of multiple imaging modalities is a crucial aspect of the diagnosis and treatment planning process. These images are often inherently registered, a useful feature in most cases, but possibly a hindrance when registration modifications are required.
Brian M. Anderson, Casey Bojechko
wiley +1 more source
Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges? [PDF]
The Internet of Things (IoT) is a new computing paradigm that spans wearable devices, homes, hospitals, cities, transportation, and critical infrastructure. Building security into this new computing paradigm is a major technical challenge today. However, what are the security problems in IoT that we can solve using existing security principles?
arxiv