Results 241 to 250 of about 13,332,800 (308)
Some of the next articles are maybe not open access.
Medical Information Protection Frameworks for Smart Healthcare based on IoT
Web Intelligence, Mining and Semantics, 2019The smart healthcare area is expanding its application to telemedicine, mobile health, EHR/EMR/PHR, wireless medical services, and precision medicine through a combination of Internet of Things (IoT) technologies.
Junho Choi +3 more
semanticscholar +1 more source
Measurement, 2019
Nowadays, Quick Response (QR) code has been used in many fields due to its advantages, such as reliability, high-speed scanning and large data capacity. However, embedding the privacy information into the QR code lacks adequate security protection.
Zhengxin Fu +3 more
semanticscholar +1 more source
Nowadays, Quick Response (QR) code has been used in many fields due to its advantages, such as reliability, high-speed scanning and large data capacity. However, embedding the privacy information into the QR code lacks adequate security protection.
Zhengxin Fu +3 more
semanticscholar +1 more source
Global Media and Communication, 2019
By examining the privacy policies of leading Chinese Internet and information service providers (IISPs), this study found their privacy policies to be generally compliant with China’s personal information protection provisions.
Tao Fu
semanticscholar +1 more source
By examining the privacy policies of leading Chinese Internet and information service providers (IISPs), this study found their privacy policies to be generally compliant with China’s personal information protection provisions.
Tao Fu
semanticscholar +1 more source
Privacy and information protection for a new generation of city services
Proceedings of the 2nd ACM/EIGSCC Symposium on Smart Cities and Communities, 2019This paper will showcase the work that the City of Portland has done around developing Privacy and Information Protection Principles considering the current state of technology, the social digital age, and advance inference algorithms like machine ...
Hector Dominguez +4 more
semanticscholar +1 more source
Information protection and information security
2020The textbook is developed in accordance with current standards at a high methodological level and can be used to study the following subjects: "Fundamentals of information security", "Information security", "information Protection", "threats to information security", "Malware", "Antivirus programs", "Technology for building secure automated systems ...
openaire +1 more source
Research of Information Protection System of Corporate Network Based on GNS3
2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT), 2019The simulation model of the corporate network protection system based on GNS3 is constructed. The GNS3 program is a graphical network emulator that allows to simulate a virtual network of more than 20 different manufacturers on a local computer, attach a
B. Korniyenko, L. Galata, L. Ladieva
semanticscholar +1 more source
The Method of the Cryptographic Information Protection in IT -Systems
2019 International Conference "Quality Management, Transport and Information Security, Information Technologies" (IT&QM&IS), 2019The subject is the information communication in IT- systems. The goal is the information protection. The method used is the cryptography with secret key. The information is transferred between the devices in IT-system. The open communication channels are
N. V. Sukhanova, R. S. Nakhushev
semanticscholar +1 more source
Protecting Personal Information
2017Introduction When you think about your privacy, you may care a great deal about your personal information. Notice the possessive pronoun: you may think about information about you as “yours,” maybe even as your property.
Leslie P. Francis, John G. Francis
openaire +1 more source
2016
In this chapter we’ll look at some of the most well-known protection mechanisms that you can use to stop attackers from accessing your business’s most important information assets. We’ll discuss approaches you can take to valuing your data, including how to incorporate a classification scheme into your business in stages, so that the cost can be ...
openaire +1 more source
In this chapter we’ll look at some of the most well-known protection mechanisms that you can use to stop attackers from accessing your business’s most important information assets. We’ll discuss approaches you can take to valuing your data, including how to incorporate a classification scheme into your business in stages, so that the cost can be ...
openaire +1 more source
MILCOM 1987 - IEEE Military Communications Conference - Crisis Communications: The Promise and Reality, 1987
openaire +2 more sources
openaire +2 more sources

