Results 41 to 50 of about 3,073,944 (343)
There is a range of reasons for securing data and systems, from those already common nowadays (IPR, licenses, privacy, confidentiality, etc.) to others likely to appear in the future (distributed trust, reputation building, social collaboration, etc.).
openaire +4 more sources
Data security has become a significant concern in recent times, with the increasing amount of sensitive data being stored and transferred through digital channels. This paper explores the various aspects of data security, including the threats, vulnerabilities, and countermeasures.
openaire +1 more source
Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection [PDF]
Most of the MANET security research has so far focused on providing routing security and confidentiality to the data packets, but less has been done to ensure privacy and anonymity of the communicating entities.
Hota, C. +3 more
core +1 more source
Bear management changes management actions according to the horizontal axis of the population size and the vertical axis of the number of nuisance bears. Aiming for the target population size of Ntar, Actions I and II protect the bears, and Action IV reduces the population.
Hiroyuki Matsuda +5 more
wiley +1 more source
Population size and dynamics fundamentally shape speciation by influencing genetic drift, founder events, and adaptive potential. Small populations may speciate rapidly due to stronger drift, whereas large populations harbor more genetic diversity, which can alter divergence trajectories. We highlight theoretical models that incorporate population size
Ryo Yamaguchi +3 more
wiley +1 more source
Homomorphic encryption location privacy-preserving scheme based on Markov model
Homomorphic encryption location privacy-preserving scheme based on Markov mode was proposed to solve the problem of location privacy and query privacy protection in location-based service systems.
Kai ZHOU,Jian-qiong HE +2 more
doaj +1 more source
Strengthening Data Security: an Holistic Approach [PDF]
In the light of heightened concern around data security, this paper highlights some of the measures that can be used to develop and strengthen security in data archiving. The paper includes discussion of the different approaches that can be taken towards
Bolton, S, Woollard, M
core
From omics to AI—mapping the pathogenic pathways in type 2 diabetes
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan +2 more
wiley +1 more source
Analysis and Improvement of Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources
Random number generators (RNGs) are essential for cryptographic applications. In most practical applications, the randomness of RNGs is provided by entropy sources.
Shuangyi Zhu +4 more
doaj +1 more source
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [PDF]
Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently.
Caire, Giuseppe +5 more
core +2 more sources

