Results 111 to 120 of about 14,261,936 (322)
In order to minimize the disparity between visible and infrared modalities and enhance pedestrian feature representation, a cross-modality person re-identification method is proposed, which integrates modality generation and feature enhancement ...
Yihan Bi+5 more
doaj +1 more source
Developed structural scheme implementation of an integrated security and formulated principles for the creation and development of an effective system of information security.
arxiv
Quantum cryptography: a practical information security perspective [PDF]
Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic ...
Paterson, Kenneth G.+2 more
core +1 more source
A Brief Study of Computer Network Security Technologies [PDF]
The rapid development of computer network system brings both a great convenience and new security threats for users. Network security problem generally includes network system security and data security. Specifically, it refers to the reliability of network system, confidentiality, integrity and availability of data information in the system.
arxiv
Indistinguishability and semantic security for quantum encryption scheme [PDF]
We investigate the definition of security for encryption scheme in quantum context. We systematically define the indistinguishability and semantic security for quantum public-key and private-key encryption schemes, and for computational security, physical security and information-theoretic security.
arxiv
Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges? [PDF]
The Internet of Things (IoT) is a new computing paradigm that spans wearable devices, homes, hospitals, cities, transportation, and critical infrastructure. Building security into this new computing paradigm is a major technical challenge today. However, what are the security problems in IoT that we can solve using existing security principles?
arxiv
Defining organisational information security culture - Perspectives from academia and industry
A. D. Veiga+3 more
semanticscholar +1 more source
A Fast Search Method for 3-Share Second-Order Masking Schemes for Lightweight S-Boxes
Masking schemes are widely adopted strategies for countering side-channel analysis (SCA) attacks. The initial hardware masking strategy, threshold implementation (TI), provides robust security against glitches in hardware platforms. The minimum number of
Yanhong Fan+3 more
doaj +1 more source
To address challenges related to the inadequate representation and inaccurate discrimination of pedestrian attributes, we propose a novel method for person re-identification, which leverages global feature learning and classification optimization ...
Yihan Bi+4 more
doaj +1 more source
A comprehensive model of information security factors for decision-makers
Rainer Diesch, Matthias Pfaff, H. Krcmar
semanticscholar +1 more source