Results 1 to 10 of about 66,842 (197)

Over-the-air software updates in the internet of things : an overview of key principles [PDF]

open access: yes, 2020
Due to the fast pace at which IoT is evolving, there is an increasing need to support over-theair software updates for security updates, bug fixes, and software extensions. To this end, multiple over-the-air techniques have been proposed, each covering a
Bauwens, Jan   +4 more
core   +1 more source

Rancang Bangun Aplikasi Keamanan Data Menggunakan Metode AES pada Smartphone [PDF]

open access: yes, 2017
Cryptography is one technique used to improve the security aspects of information. Cryptography is the study of science and art to maintain a message or data information so that the data is safe.
Hasibuan, A. M. (Amir)
core   +2 more sources

Editorial [PDF]

open access: yesJournal of Universal Computer Science
Dear Readers, At the end of this year, it gives me great pleasure to announce another regular issue of J.UCS. In this issue, various topical aspects of computer science are covered in 6 articles by 14 authors from 7 countries – Armenia,
Christian Gütl
doaj   +3 more sources

Roadmap on optical security [PDF]

open access: yes, 2016
Postprint (author's final ...
Javidi, Bahram   +2 more
core   +2 more sources

Privately Connecting Mobility to Infectious Diseases via Applied Cryptography [PDF]

open access: yes, 2021
Human mobility is undisputedly one of the critical factors in infectious disease dynamics. Until a few years ago, researchers had to rely on static data to model human mobility, which was then combined with a transmission model of a particular disease ...
Bampoulidis, Alexandros   +5 more
core   +1 more source

Transparent code authentication at the processor level [PDF]

open access: yes, 2009
The authors present a lightweight authentication mechanism that verifies the authenticity of code and thereby addresses the virus and malicious code problems at the hardware level eliminating the need for trusted extensions in the operating system.
A.O. Durahim   +32 more
core   +2 more sources

A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing [PDF]

open access: yes, 2016
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over ...
Kiraz, Mehmet Sabir
core   +1 more source

Mobile Application Security Platforms Survey [PDF]

open access: yes, 2016
Nowadays Smartphone and other mobile devices have become incredibly important in every aspect of our life. Because they have practically offered same capabilities as desktop workstations as well as come to be powerful in terms of CPU (Central processing ...
Amen, Bakhtiar   +2 more
core   +1 more source

Modeling Adversaries in a Logic for Security Protocol Analysis [PDF]

open access: yes, 2012
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which considers only adversaries that can compose and replay messages, and ...
Halpern, Joseph Y., Pucella, Riccardo
core   +1 more source

Home - About - Disclaimer - Privacy