Results 61 to 70 of about 993,359 (292)

Problems of providing information security in the system of public administration

open access: yesAspekti Publìčnogo Upravlìnnâ, 2018
The article analyzes the scientific approaches to the problem of providing information security of the public administration system. It was determined that information security in the system of public administration is an integral part of the national ...
Y. I. Chmyr
doaj   +1 more source

Функціонально-вартісний аналіз системи забезпечення інформаційної безпеки телекомунікаційних мереж загального користування [PDF]

open access: yes, 2005
Розглядаються моделі і задачі функціонально-вартісного аналізу системи забезпечення інформаційної безпеки телекомунікаційних мереж загального користування з урахуванням положень міжнародних стандартів МСЕ-Т Х.800, Х.805.
Кононович, Володимир   +1 more
core  

An Elementary Completeness Proof for Secure Two-Party Computation Primitives

open access: yes, 2014
In the secure two-party computation problem, two parties wish to compute a (possibly randomized) function of their inputs via an interactive protocol, while ensuring that neither party learns more than what can be inferred from only their own input and ...
Ishwar, Prakash   +2 more
core   +1 more source

Innate Immune Reprogramming Mediated by Endogenous Retroelement Dysregulation Drives Multiple Sclerosis Progression

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
Epigenetic reprogramming in hematopoietic stem and progenitor cells (HSPCs) and downstream myeloid cells, mediated by H3.3 downregulation and endogenous retroelement (ERE) overexpression, contributes to the progression of multiple sclerosis (MS). ABSTRACT Background Skewed myelopoiesis in the bone marrow has been identified as a key driver of multiple ...
Li‐Mei Xiao   +6 more
wiley   +1 more source

Secure Beamforming For MIMO Broadcasting With Wireless Information And Power Transfer

open access: yes, 2014
This paper considers a basic MIMO information-energy (I-E) broadcast system, where a multi-antenna transmitter transmits information and energy simultaneously to a multi-antenna information receiver and a dual-functional multi-antenna energy receiver ...
Shi, Qingjiang   +4 more
core   +2 more sources

Location‐Specific Hematoma Volume Predicts Early Neurological Deterioration in Supratentorial ICH

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Early neurological deterioration (END) adversely affects outcomes in patients with intracerebral hemorrhage (ICH). This study aimed to determine the location‐specific hematoma volumes for END in supratentorial ICH patients. Methods We retrospectively analyzed supratentorial ICH patients presenting from two prospective cohorts.
Zuoqiao Li   +10 more
wiley   +1 more source

Organizational and Economic Aspects of Ensuring Information Security in Logistics Systems

open access: yesУправленческое консультирование
The article discusses issues of ensuring information and economic security as one of the most important qualitative characteristics of logistics systems that determine the ability to ensure the established parameters of material flows in the process of ...
A. V. Dmitriev
doaj   +1 more source

Peculiarities of legal regulation of activities of the National Police of Ukraine in the field of ensuring information security in Ukraine

open access: yesLaw and Safety, 2020
Based on the analysis of scientific concepts and legal principles the author has provided the definition of information security, provision of information security in Ukraine and has characterized its components.
I. D. Kazanchuk, V. P. Yatsenko
doaj   +1 more source

e-Navigation and Electronic Charting: Implications for Hydrographic Community [PDF]

open access: yes, 2009
e-Navigation is a recent IMO initiative that aims to integrate existing/new shipboard and shore-based navigational tools into an “all embracing” system. Defined as: “...
Alexander, Lee
core   +1 more source

S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX

open access: yes, 2018
Function-as-a-Service (FaaS) is a recent and already very popular paradigm in cloud computing. The function provider need only specify the function to be run, usually in a high-level language like JavaScript, and the service provider orchestrates all the
Alder, Fritz   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy