Results 61 to 70 of about 22,394,325 (191)

A Brief Study of Computer Network Security Technologies [PDF]

open access: yesarXiv
The rapid development of computer network system brings both a great convenience and new security threats for users. Network security problem generally includes network system security and data security. Specifically, it refers to the reliability of network system, confidentiality, integrity and availability of data information in the system.
arxiv  

The impact of Big Data analytics and data security practices on service supply chain performance

open access: yesBenchmarking : An International Journal, 2018
PurposeThe purpose of this paper is to investigate the effects of Big Data analytics, data security and service supply chain innovation capabilities on services supply chain performance.Design/methodology/approachThe paper draws on the relational view of
Yudi Fernando   +2 more
semanticscholar   +1 more source

Security for IEEE P1451.1.6-based Sensor Networks for IoT Applications [PDF]

open access: yesarXiv
There are many challenges for Internet of Things (IoT) sensor networks including the lack of robust standards, diverse wireline and wireless connectivity, interoperability, security, and privacy. Addressing these challenges, the Institute of Electrical and Electronics Engineers (IEEE) P1451.0 standard defines network services, transducer services ...
arxiv  

Geographical Security Questions for Fallback Authentication [PDF]

open access: yesarXiv, 2019
Fallback authentication is the backup authentication method used when the primary authentication method (e.g., passwords, fingerprints, etc.) fails. Currently, widely-deployed fallback authentication methods (e.g., security questions, email resets, and SMS resets) suffer from documented security and usability flaws that threaten the security of ...
arxiv  

Healthcare Data Security Technology: HIPAA Compliance

open access: yesWireless Communications and Mobile Computing, 2019
Information technology (IT) plays an increasingly important and prominent role in the health sector. Data security is more important than ever to the healthcare industry and in world in general.
Scholas Mbonihankuye   +2 more
semanticscholar   +1 more source

Report on the IBM data security study [PDF]

open access: bronze, 1974
Lee Danner   +3 more
openalex   +1 more source

Reconfigurable Security: Edge Computing-based Framework for IoT [PDF]

open access: yesarXiv, 2017
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications. In this article, we first provide requirements and existing solutions for IoT security.
arxiv  

Home - About - Disclaimer - Privacy