Results 121 to 130 of about 70,409 (156)
Some of the next articles are maybe not open access.

Developing IoT Competencies in Non-Computer Science Students in Higher Education

Information Technology Trends, 2019
This paper investigates the skills needed by Higher Education (HE) students to become successful Internet of Things (IoT) future leaders/developers. The paper focuses on the programming and Maths aspects, being fundamental to IoT development, in addition
Belsam Attallah   +2 more
semanticscholar   +1 more source

Challenges in Cryptography

IEEE Security and Privacy, 2021
Cryptography as a field of study is exciting because it brings together beautiful mathematics and many cutting-edge areas of computer science and engineering to find solutions that touch all aspects of life in a digital era.
A. Menezes, D. Stebila
semanticscholar   +1 more source

A Novel Pseudo-Random Number Generator Based on Linear Feedback Shift Register and Its Security Analysis

International Conference on Frontiers of Electronics, Information and Computation Technologies, 2021
The random number is an essential mathematical element in computer science, electronic science, and information science, which is widely used in machine learning, artificial intelligence, secret communication, identity verification, channel coding, image
Ye Feng   +3 more
semanticscholar   +1 more source

Data Encryption Algorithm Based on Chaos Sequence in Computer Network Security

2023 IEEE 3rd International Conference on Power, Electronics and Computer Applications (ICPECA), 2023
Information security is related to personal interests, enterprise survival, social stability, state secrets, etc., and is closely related to my country's economic security, social security and national security. Therefore, research on reliable and secure
Rongyu Zhu
semanticscholar   +1 more source

The improvement of data encryption technology in computer network security

2022 International Conference on Artificial Intelligence in Everything (AIE), 2022
With the continual advance of innovation and science and technology in Japan, Japan entered the information age. The development of computer technology and information technology brought us a lot of convenience in our work and life, its security problem ...
Liang Zhou, Chang Liu
semanticscholar   +1 more source

Research on Data Encryption Technology in Computer Network Communication Security Based on Genetic Algorithms

International Conference on Information Systems and Computer Aided Education, 2021
With the rapid development of science and technology, network communication technology has been widely used in various industries, but there are many communication security problems.
Longkai Zhang   +3 more
semanticscholar   +1 more source

Implementing Robust Data Privacy and Security in Modern ERP Systems: A Technical Deep Dive

International Journal of Scientific Research in Computer Science Engineering and Information Technology
Enterprise Resource Planning (ERP) systems have become crucial components in modern business operations, demanding robust security measures to protect sensitive data and maintain operational integrity. This comprehensive article explores the multifaceted
Sathyananda Kumar Pamarthy
semanticscholar   +1 more source

Implementing Privacy-First Architecture: A Technical Guide to Ethical Data Pipelines and AI Systems

International Journal of Scientific Research in Computer Science Engineering and Information Technology
This comprehensive technical article explores the implementation of privacy-first architecture in modern data pipelines and AI systems, addressing the critical intersection of privacy, ethics, and technological advancement.
Amber Chowdhary
semanticscholar   +1 more source

Challenges of Digital Investigations in Nowadays Communication Networks

Computer Science Symposium in Russia
As a branch of digital investigation network foren-sics is faced with different arising challenges due to the evolution of modern networks. These networks are getting faster, more dynamic and self-provisioned, which hampers the identification of ...
Daniel Spiekermann, Jörg Keller
semanticscholar   +1 more source

Software-Defined Security Architecture for a Smart Home Networks Using Token Sharing Mechanism

Recent Advances in Computer Science and Communications, 2019
Several approaches were proposed earlier to provide a secure infrastructure dependent communication in a smart home network. Some used overlay networks, some used lightweight encryption techniques, and some used honey pot techniques.
Utkarsh Saxena, J. Sodhi, Yaduveer Singh
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy