Results 51 to 60 of about 25,084,029 (287)

Improving Both Quantity and Quality: Incentive Mechanism for Social Mobile Crowdsensing Architecture

open access: yesIEEE Access, 2018
Mobile crowdsensing has emerged as an efficient paradigm for performing large-scale sensing tasks. Improving both the quantity and quality of users is still the pivotal problem for mobile crowdsensing system.
Jia Xu   +4 more
doaj   +1 more source

Secure Data of Industrial Internet of Things in a Cement Factory Based on a Blockchain Technology

open access: yesApplied Sciences, 2021
The Industrial Internet of Things (IIoT) has become a pivotal field of development that can increase the efficiency of real-time collection, recording, analysis, and control of the entire activities of various machines, and can actively enhance quality ...
Samir M. Umran   +4 more
doaj   +1 more source

Detecting periodic subsequences in cyber security data

open access: yes, 2017
Statistical approaches to cyber-security involve building realistic probability models of computer network data. In a data pre-processing phase, separating automated events from those caused by human activity should improve statistical model building and
Heard, Nick   +2 more
core   +1 more source

Homomorphic encryption location privacy-preserving scheme based on Markov model

open access: yes网络与信息安全学报, 2017
Homomorphic encryption location privacy-preserving scheme based on Markov mode was proposed to solve the problem of location privacy and query privacy protection in location-based service systems.
Kai ZHOU,Jian-qiong HE   +2 more
doaj   +1 more source

Data Security Sharing and Storage Based on a Consortium Blockchain in a Vehicular Ad-hoc Network

open access: yesIEEE Access, 2019
A vehicular ad-hoc network (VANET) can improve the flow of traffic to facilitate intelligent transportation and to provide convenient information services, where the goal is to provide self-organizing data transmission capabilities for vehicles on the ...
Xiaohong Zhang, Xiaofeng Chen
semanticscholar   +1 more source

A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing

open access: yesIEEE Access, 2020
Mobile edge computing, with characteristics of position awareness, mobile support, low latency, decentralization, and distribution, has received widespread attention from industry and academia, and has been applied to application areas such as ...
Yichen Hou   +5 more
semanticscholar   +1 more source

Strengthening Data Security: an Holistic Approach [PDF]

open access: yes, 2008
In the light of heightened concern around data security, this paper highlights some of the measures that can be used to develop and strengthen security in data archiving. The paper includes discussion of the different approaches that can be taken towards
Bolton, S, Woollard, M
core  

Types for Location and Data Security in Cloud Environments [PDF]

open access: yes, 2017
Cloud service providers are often trusted to be genuine, the damage caused by being discovered to be attacking their own customers outweighs any benefits such attacks could reap.
Chothia, Tom   +2 more
core   +3 more sources

Analysis and Improvement of Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Random number generators (RNGs) are essential for cryptographic applications. In most practical applications, the randomness of RNGs is provided by entropy sources.
Shuangyi Zhu   +4 more
doaj   +1 more source

PUFchain: A Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE) [PDF]

open access: yesIEEE Consumer Electronics Magazine, 2019
This article presents the first-ever blockchain that can simultaneously handle device and data security, which is important for the emerging Internet-of-Everything (IoE).
S. Mohanty   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy