Results 111 to 120 of about 5,973,902 (354)

CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing [PDF]

open access: yesarXiv, 2019
Cloud computing has been adopted widely, providing on-demand computing resources to improve perfornance and reduce the operational costs. However, these new functionalities also bring new ways to exploit the cloud computing environment. To assess the security of the cloud, graphical security models can be used, such as Attack Graphs and Attack Trees ...
arxiv  

Computer-aided proofs for multiparty computation with active security [PDF]

open access: yes, 2018
Secure multi-party computation (MPC) is a general cryptographic technique that allows distrusting parties to compute a function of their individual inputs, while only revealing the output of the function.
Haagh, Helene   +4 more
core   +2 more sources

Development of a generic focal spot measurement method suitable for bore‐type linacs

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose In linear accelerators, deviations in the x‐ray focal spot position significantly affect the accuracy of radiation therapy. However, as the focal spot position in bore‐type linac systems such as the Radixact system, cannot be assessed using conventional methods, a new evaluation method is required.
Hidetoshi Shimizu   +5 more
wiley   +1 more source

Security Architecture for Cloud-Based Command and Control System in IoT Environment

open access: yesApplied Sciences, 2020
With the development of the fourth industrial technology, such as the Internet of Things (IoT) and cloud computing, developed countries including the U.S.
Jahoon Koo   +3 more
doaj   +1 more source

Security in Brain-Computer Interfaces

open access: yesACM Computing Surveys, 2019
Brain-Computer Interfaces (BCIs) have significantly improved the patients’ quality of life by restoring damaged hearing, sight, and movement capabilities.
Sergio López Bernal   +4 more
semanticscholar   +1 more source

A Modified ck-Secure Sum Protocol for Multi-Party Computation [PDF]

open access: yesJournal of Computing, Volume 2, Issue 2, February 2010, https://sites.google.com/site/journalofcomputing/, 2010
Secure Multi-Party Computation (SMC) allows multiple parties to compute some function of their inputs without disclosing the actual inputs to one another. Secure sum computation is an easily understood example and the component of the various SMC solutions.
arxiv  

Surface dose analysis and dosimetric comparison of Halcyon versus Truebeam in breast cancer radiotherapy: An OSL dosimetry study

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose Breast cancer is a neoplastic disease with high prevalence among women. Radiotherapy is one of the principal treatment modalities for this disease, but it poses significant challenges. This study aimed to compare and evaluate the technical and dosimetric performance of conventional C‐arm linac systems and a new design, Halcyon, in the ...
Mustafa Çağlar   +8 more
wiley   +1 more source

Nice to know [PDF]

open access: yes, 2008
The byproduct of today’s massive interconnectivity is that basically nothing and no-one is immune to cyber attacks any longer. Sadly, this can be demonstrated rather trivially.
Etalle, Sandro
core   +2 more sources

DICOM attribute manipulation tool: Easily change frame of reference, series instance, and SOP instance UID

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose In radiation oncology, the integration and registration of multiple imaging modalities is a crucial aspect of the diagnosis and treatment planning process. These images are often inherently registered, a useful feature in most cases, but possibly a hindrance when registration modifications are required.
Brian M. Anderson, Casey Bojechko
wiley   +1 more source

Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges? [PDF]

open access: yesarXiv, 2017
The Internet of Things (IoT) is a new computing paradigm that spans wearable devices, homes, hospitals, cities, transportation, and critical infrastructure. Building security into this new computing paradigm is a major technical challenge today. However, what are the security problems in IoT that we can solve using existing security principles?
arxiv  

Home - About - Disclaimer - Privacy