Results 111 to 120 of about 25,084,029 (287)
Precision Health Data: Requirements, Challenges and Existing Techniques for Data Security and Privacy [PDF]
Chandra Thapa, S. Çamtepe
semanticscholar +1 more source
Data security for third generation telecommunication systems [PDF]
This research work started as a humble, and yet ambitious attempt of enhancing the current security level in wireless data communication. Detailed analysis of the existing security protocols and wireless networks, together with their strengths and ...
Delivasilis, Dimitrios L.
core
Data security is crucial for Japanese science [PDF]
Eitaka Tsuboi+4 more
openalex +1 more source
High performance image steganography integrating IWT and Hamming code within secret sharing
Steganography and secret sharing are schemes to increase the security of private information against attackers. Steganography emphasizes secrecy while secret sharing distributes the secret key in shares that are conditionally classified to reconstruct ...
Zahra Saeidi+4 more
doaj +1 more source
Attribute identification based IoT fog data security control and forwarding. [PDF]
Xiao J, Chang C, Wu P, Ma Y.
europepmc +1 more source
Multi-camera spatio-temporal fusion and biased sequence-data learning for security surveillance [PDF]
Gang Wu+4 more
openalex +1 more source
As an effective way to securely transfer secret images, secret image sharing (SIS) has been a noteworthy area of research. Basically in a SIS scheme, a secret image is shared via shadows and could be reconstructed by having the required number of them. A
Sara Charoghchi+2 more
doaj +1 more source
Design and Realization of a New Signal Security System for Multimedia Data Transmission [PDF]
Hun‐Chen Chen+3 more
openalex +1 more source
Enhancing Data Security of Cloud Based LMS. [PDF]
Chatterjee P, Bose R, Banerjee S, Roy S.
europepmc +1 more source
Analysing potential data security losses in organisations based on subsequent users logins. [PDF]
Aziz B.
europepmc +1 more source