Results 41 to 50 of about 1,020 (118)

Privacy-preserving brain tumor detection using FPGA-accelerated deep learning on Kria KV260 for smart healthcare

open access: yesComputer Methods and Programs in Biomedicine Update
Technological advancements in high-performance electronics have fueled the development of cutting-edge medical applications, leading to exponential growth in effective treatment and diagnostic solutions for various medical problems.
Kusum Lata   +3 more
doaj   +1 more source

Diseño y desarrollo de una herramienta para análisis forense de backups de dispositivos Iphone [PDF]

open access: yes, 2014
El uso de los dispositivos móviles se extiende día a día convirtiéndose en el medio principal de la mayoría de las personas para comunicarse, gestionar sus tareas diarias, guardar información personal o gastar su tiempo de ocio.
Señor Palazuelo, Adrián
core  

On time-memory trade-offs for password hashing schemes

open access: yesFrontiers in Computer Science
A password hashing algorithm is a cryptographic method that transforms passwords into a secure and irreversible format. It is used not only for authentication purposes but also for key derivation mechanisms.
Ayse Nurdan Saran
doaj   +1 more source

PALPAS - PAsswordLess PAssword Synchronization

open access: yes, 2015
Tools that synchronize passwords over several user devices typically store the encrypted passwords in a central online database. For encryption, a low-entropy, password-based key is used.
Buchmann, Johannes   +2 more
core   +2 more sources

Deep Learning-Based Brain Tumor Detection in Privacy-Preserving Smart Health Care Systems

open access: yesIEEE Access
Deep learning has been widely used in medical image processing, which has sparked the development of a wide range of applications and led to a notable increase in the number of therapeutic and diagnostic options available for a range of medical imaging ...
Kusum Lata   +3 more
doaj   +1 more source

Information-Theoretic Security for the Masses [PDF]

open access: yes, 2013
We combine interactive zero-knowledge protocols and weak physical layer randomness properties to construct a protocol which allows bootstrapping an IT-secure and PF-secure channel from a memorizable shared secret.
Nikitin, Oleksandr
core  

Evaluation of Professional Cloud Password Management Tools [PDF]

open access: yes, 2016
Strong passwords have been preached since decades. However, lot of the regular users of IT systems resort to simple and repetitive passwords, especially nowadays in the “service era”.
Dragoni, Nicola   +2 more
core   +2 more sources

Multi-Factor Authentication for In-Vehicle Secure OTA Protocol

open access: yesIEEE Access
As advancements in vehicle electronics and intelligence accelerate, the number of electronic control units (ECUs) is rapidly increasing, thereby heightening the likelihood of errors and cyberattacks.
Hyeonseong Kim, Sanghoon Jeon
doaj   +1 more source

Bootbandit: A macOS Bootloader Attack [PDF]

open access: yes, 2017
Full disk encryption (FDE) is used to protect a computer system against data theft by physical access. If a laptop or hard disk drive protected with FDE is stolen or lost, the data remains unreadable without the encryption key.
Boursalian, Armen
core   +1 more source

Administration application with Angular, Node and Express for a Django application [PDF]

open access: yes, 2016
En este trabajo de fin de grado se ha desarrollado una aplicación de administración que sustituye a las que ofrecen por defecto las aplicaciones creadas con el framework de desarrollo web Django.
Carreño Villalba, Rubén
core  

Home - About - Disclaimer - Privacy