Results 111 to 120 of about 14,261,936 (322)

Cross-Modality Person Re-Identification Method with Joint-Modality Generation and Feature Enhancement

open access: yesEntropy
In order to minimize the disparity between visible and infrared modalities and enhance pedestrian feature representation, a cross-modality person re-identification method is proposed, which integrates modality generation and feature enhancement ...
Yihan Bi   +5 more
doaj   +1 more source

Monografia [PDF]

open access: yesarXiv, 2012
Developed structural scheme implementation of an integrated security and formulated principles for the creation and development of an effective system of information security.
arxiv  

Quantum cryptography: a practical information security perspective [PDF]

open access: yes, 2009
Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic ...
Paterson, Kenneth G.   +2 more
core   +1 more source

A Brief Study of Computer Network Security Technologies [PDF]

open access: yesarXiv
The rapid development of computer network system brings both a great convenience and new security threats for users. Network security problem generally includes network system security and data security. Specifically, it refers to the reliability of network system, confidentiality, integrity and availability of data information in the system.
arxiv  

Indistinguishability and semantic security for quantum encryption scheme [PDF]

open access: yesarXiv, 2015
We investigate the definition of security for encryption scheme in quantum context. We systematically define the indistinguishability and semantic security for quantum public-key and private-key encryption schemes, and for computational security, physical security and information-theoretic security.
arxiv  

Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges? [PDF]

open access: yesarXiv, 2017
The Internet of Things (IoT) is a new computing paradigm that spans wearable devices, homes, hospitals, cities, transportation, and critical infrastructure. Building security into this new computing paradigm is a major technical challenge today. However, what are the security problems in IoT that we can solve using existing security principles?
arxiv  

Defining organisational information security culture - Perspectives from academia and industry

open access: yesComputers & security, 2020
A. D. Veiga   +3 more
semanticscholar   +1 more source

A Fast Search Method for 3-Share Second-Order Masking Schemes for Lightweight S-Boxes

open access: yesIET Information Security
Masking schemes are widely adopted strategies for countering side-channel analysis (SCA) attacks. The initial hardware masking strategy, threshold implementation (TI), provides robust security against glitches in hardware platforms. The minimum number of
Yanhong Fan   +3 more
doaj   +1 more source

Enhancing Person Re-Identification through Attention-Driven Global Features and Angular Loss Optimization

open access: yesEntropy
To address challenges related to the inadequate representation and inaccurate discrimination of pedestrian attributes, we propose a novel method for person re-identification, which leverages global feature learning and classification optimization ...
Yihan Bi   +4 more
doaj   +1 more source

A comprehensive model of information security factors for decision-makers

open access: yesComputers & security, 2020
Rainer Diesch, Matthias Pfaff, H. Krcmar
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy