Results 251 to 260 of about 285,701 (294)
Some of the next articles are maybe not open access.
Electromagnetic Information Leakage and Protection
2019Computer as information processing facility is pervasive in modern society, and information processing includes calculation, storage, transmission, exchange and so on. Components of computer play important roles during such processes; in the meantime, electromagnetic security issue exists.
Taikang Liu, Yongmei Li
openaire +1 more source
Protecting Electronic Signatures in Case of Key Leakage
2017We present a protection mechanism against forgery of electronic signatures with the original signing keys. It works for standard signatures based on discrete logarithm problem such as DSA. It requires only a slight modification of the signing device – an implementation of an additional hidden evidence functionality.
Miroslaw Kutylowski +5 more
openaire +1 more source
Surface Leakage Protection - Next generation of electrocution protection technology
2014 IEEE IAS Electrical Safety Workshop, 2014In past decades, many efforts have been given to improving the Residual Current Device (RCD) that has been the major and only means for electrocution protection since 1955. However, all of those efforts are based on the principle of RCDs, which are no longer in accordance with modern appliance usage, and in many cases RCDs may cause nuisance trips or ...
null Wei Wu, null Yuejia Wu
openaire +1 more source
Protecting organizational competitive advantage: A knowledge leakage perspective
Computers & Security, 2014Abstract The strategic management literature emphasizes the importance of protecting organizational knowledge and information, especially in terms of maintaining competitive advantage. We synthesized several mechanisms from the literature that organizations could deploy to protect their knowledge and information.
Atif Ahmad +2 more
openaire +1 more source
Leakage Assessment of Protective Gas Masks
1988Abstract : This peer group review meeting of respiratory quantitative fit test (QNFT) methods intended to consider (1) the advantages and disadvantages of presently used fit test methods, (2) the applicability of present methods to field effectiveness measurements, (3) improved methods for determining leakage of respirators, and (4) other research ...
Frank Shanty +2 more
openaire +1 more source
Protection Material of Electromagnetic Information Leakage
2019Electromagnetic wave is a major way of electromagnetism energy transmission, which is radiated to outside when the high-frequency circuit operates. Since the electromagnetic waves radiated from the device are strongly related to the information being processed, they may cause information leakage and threat to information security.
Taikang Liu, Yongmei Li
openaire +1 more source
Schutz der Unternehmensdaten — Data Leakage Protection (DLP)
HMD Praxis der Wirtschaftsinformatik, 2011Wenn ein Unternehmen den Zugang zu seinen Daten und den Umgang der Mitarbeiter mit diesen Daten nicht schutzt und entsprechend regelt, besteht die Gefahr, dass diese Daten irgendwann gestohlen werden oder unautorisiert das Unternehmen verlassen. Mit Data Leakage Protection (DLP) werden Systeme am Markt angeboten, die den unautorisierten Abfluss von ...
Michael Föck, Hans-Peter Fröschle
openaire +1 more source
Leakage protection device based on smart home
2020 International Conference on Virtual Reality and Intelligent Systems (ICVRIS), 2020With the development of science and technology and the improvement of living standards, the concept of smart home system has begun to move towards the masses, and home intelligence will definitely be a hot topic in the field of automatic control for a long time to come.
Hongwen Cai +3 more
openaire +1 more source
Leakage protection for carbon-intensive materials post-2020 [PDF]
Climate protection is a global challenge that all countries have a common but differentiated responsibility to address. However, not all governments are willing to commit to targets of equal stringency, and individual countries may put different emphases on carbon pricing in their policy mix.
Karsten Neuhoff +4 more
openaire +1 more source
Performance of media based information leakage protection
2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), 2013There are many occasions that an organization needs to distribute important data to only authorized agents. However, there might happen illegal interceptions of the data by unauthorized agents. Commonly used methods of protecting information from unauthorized accesses have been based on text, but there have also appeared media based approaches in the ...
Vivek Venktachalam, Jin H. Park
openaire +1 more source

