Results 281 to 290 of about 1,786,070 (326)
Some of the next articles are maybe not open access.
The Journal of medical practice management : MPM, 2006
As you can see, there are a number of different ways to protect your network with different protocols, all of which can be very confusing to people whose core business process is not technology. This article is only a brief synopsis of the dangers that lurk in the corners of the technology world.
+6 more sources
As you can see, there are a number of different ways to protect your network with different protocols, all of which can be very confusing to people whose core business process is not technology. This article is only a brief synopsis of the dangers that lurk in the corners of the technology world.
+6 more sources
Network security (security in large networks)
Proceedings 25th Annual IEEE Conference on Local Computer Networks. LCN 2000, 2002It is common that users or hosts in a large network are partitioned and organized as a hierarchical free where children of the same parent from a group. Secure broadcasting intends to provide a secure communication channel from a sending principal to a group of legal receiving principals.
M. Singh, S. Singh
openaire +1 more source
2010
Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems.
Tansu Alpcan, Tamer Başar
+5 more sources
Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems.
Tansu Alpcan, Tamer Başar
+5 more sources
2018
This chapter describes how with the rapid increase of internet users, more people have access to global information and communication technology. As a result of which, the issues of using the internet as a global platform for the enabling of smart objects and machines to coordinate, communicate, compute and calculate, gradually emerge. In Mobile Ad-hoc
Mamata Rath +3 more
+4 more sources
This chapter describes how with the rapid increase of internet users, more people have access to global information and communication technology. As a result of which, the issues of using the internet as a global platform for the enabling of smart objects and machines to coordinate, communicate, compute and calculate, gradually emerge. In Mobile Ad-hoc
Mamata Rath +3 more
+4 more sources
Proceedings of the 3rd ACM conference on Computer and communications security - CCS '96, 1996
In this paper we identify and address the challenges unique to providing a secure ATM network. We analyse the network environment and consider the correct placement of security mechanisms, with particular attention to data transfer protection, in such an environment. We then introduce and describe a key agile cryptographic device for ATM networks.
openaire +1 more source
In this paper we identify and address the challenges unique to providing a secure ATM network. We analyse the network environment and consider the correct placement of security mechanisms, with particular attention to data transfer protection, in such an environment. We then introduce and describe a key agile cryptographic device for ATM networks.
openaire +1 more source
Proceedings 1996 IEEE Symposium on Security and Privacy, 1999
L. Van Doorn +3 more
openaire +1 more source
L. Van Doorn +3 more
openaire +1 more source
Climate change impacts on plant pathogens, food security and paths forward
Nature Reviews Microbiology, 2023Brajesh K Singh +2 more
exaly
The rumen microbiome: balancing food security and environmental impacts
Nature Reviews Microbiology, 2021Itzhak Mizrahi, Robert Wallace
exaly
Managing network security: Simulating network security
Network Security, 1999openaire +1 more source

