Results 251 to 260 of about 285,701 (294)
Some of the next articles are maybe not open access.

Electromagnetic Information Leakage and Protection

2019
Computer as information processing facility is pervasive in modern society, and information processing includes calculation, storage, transmission, exchange and so on. Components of computer play important roles during such processes; in the meantime, electromagnetic security issue exists.
Taikang Liu, Yongmei Li
openaire   +1 more source

Protecting Electronic Signatures in Case of Key Leakage

2017
We present a protection mechanism against forgery of electronic signatures with the original signing keys. It works for standard signatures based on discrete logarithm problem such as DSA. It requires only a slight modification of the signing device – an implementation of an additional hidden evidence functionality.
Miroslaw Kutylowski   +5 more
openaire   +1 more source

Surface Leakage Protection - Next generation of electrocution protection technology

2014 IEEE IAS Electrical Safety Workshop, 2014
In past decades, many efforts have been given to improving the Residual Current Device (RCD) that has been the major and only means for electrocution protection since 1955. However, all of those efforts are based on the principle of RCDs, which are no longer in accordance with modern appliance usage, and in many cases RCDs may cause nuisance trips or ...
null Wei Wu, null Yuejia Wu
openaire   +1 more source

Protecting organizational competitive advantage: A knowledge leakage perspective

Computers & Security, 2014
Abstract The strategic management literature emphasizes the importance of protecting organizational knowledge and information, especially in terms of maintaining competitive advantage. We synthesized several mechanisms from the literature that organizations could deploy to protect their knowledge and information.
Atif Ahmad   +2 more
openaire   +1 more source

Leakage Assessment of Protective Gas Masks

1988
Abstract : This peer group review meeting of respiratory quantitative fit test (QNFT) methods intended to consider (1) the advantages and disadvantages of presently used fit test methods, (2) the applicability of present methods to field effectiveness measurements, (3) improved methods for determining leakage of respirators, and (4) other research ...
Frank Shanty   +2 more
openaire   +1 more source

Protection Material of Electromagnetic Information Leakage

2019
Electromagnetic wave is a major way of electromagnetism energy transmission, which is radiated to outside when the high-frequency circuit operates. Since the electromagnetic waves radiated from the device are strongly related to the information being processed, they may cause information leakage and threat to information security.
Taikang Liu, Yongmei Li
openaire   +1 more source

Schutz der Unternehmensdaten — Data Leakage Protection (DLP)

HMD Praxis der Wirtschaftsinformatik, 2011
Wenn ein Unternehmen den Zugang zu seinen Daten und den Umgang der Mitarbeiter mit diesen Daten nicht schutzt und entsprechend regelt, besteht die Gefahr, dass diese Daten irgendwann gestohlen werden oder unautorisiert das Unternehmen verlassen. Mit Data Leakage Protection (DLP) werden Systeme am Markt angeboten, die den unautorisierten Abfluss von ...
Michael Föck, Hans-Peter Fröschle
openaire   +1 more source

Leakage protection device based on smart home

2020 International Conference on Virtual Reality and Intelligent Systems (ICVRIS), 2020
With the development of science and technology and the improvement of living standards, the concept of smart home system has begun to move towards the masses, and home intelligence will definitely be a hot topic in the field of automatic control for a long time to come.
Hongwen Cai   +3 more
openaire   +1 more source

Leakage protection for carbon-intensive materials post-2020 [PDF]

open access: possibleDIW Economic Bulletin, 2015
Climate protection is a global challenge that all countries have a common but differentiated responsibility to address. However, not all governments are willing to commit to targets of equal stringency, and individual countries may put different emphases on carbon pricing in their policy mix.
Karsten Neuhoff   +4 more
openaire   +1 more source

Performance of media based information leakage protection

2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), 2013
There are many occasions that an organization needs to distribute important data to only authorized agents. However, there might happen illegal interceptions of the data by unauthorized agents. Commonly used methods of protecting information from unauthorized accesses have been based on text, but there have also appeared media based approaches in the ...
Vivek Venktachalam, Jin H. Park
openaire   +1 more source

Home - About - Disclaimer - Privacy