Results 31 to 40 of about 459,551 (229)
Secure and Fault-Tolerant IoT-Based Healthcare System for Reliable Decision-Making
Internet of Things (IoT) integration has revolutionized healthcare, offering personalized medical care through remote patient monitoring and telemedicine. However, challenges remain in critical healthcare scenarios, such as data security vulnerabilities
Bashaer Almelehy +3 more
doaj +1 more source
BackgroundSeveral obstacles prevent the adoption and use of personal health record (PHR) systems, including users’ concerns regarding the privacy and security of their personal health information.
Carrión Señor, Inmaculada +2 more
doaj +1 more source
Soft Constraint Programming to Analysing Security Protocols
Security protocols stipulate how the remote principals of a computer network should interact in order to obtain specific security goals. The crucial goals of confidentiality and authentication may be achieved in various forms, each of different strength.
Bella, Giampaolo, Bistarelli, Stefano
core +2 more sources
This special volume of Statistical Sciences presents some innovative, if not provocative, ideas in the area of reliability, or perhaps more appropriately named, integrated system assessment.
Anderson-Cook, Christine +2 more
core +1 more source
Nonmalleable Information Flow: Technical Report
Noninterference is a popular semantic security condition because it offers strong end-to-end guarantees, it is inherently compositional, and it can be enforced using a simple security type system.
Arden, Owen +2 more
core +1 more source
Deep Space Network information system architecture study [PDF]
The purpose of this article is to describe an architecture for the Deep Space Network (DSN) information system in the years 2000-2010 and to provide guidelines for its evolution during the 1990s.
Atkinson, D. J. +9 more
core +1 more source
Digital twins to accelerate target identification and drug development for immune‐mediated disorders
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley +1 more source
Modeling Adversaries in a Logic for Security Protocol Analysis [PDF]
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which considers only adversaries that can compose and replay messages, and ...
Halpern, Joseph Y., Pucella, Riccardo
core +1 more source
Bioscience students were asked for their opinions on the value and teaching of skills. 204 responded that teamwork, time management and study skills are necessary to reach University, that scientific writing, research, laboratory and presentation skills are taught effectively during their studies, while other skills are gained inherently through study ...
Janella Borrell, Susan Crennell
wiley +1 more source
Trust in Crowds: probabilistic behaviour in anonymity protocols [PDF]
The existing analysis of the Crowds anonymity protocol assumes that a participating member is either ‘honest’ or ‘corrupted’. This paper generalises this analysis so that each member is assumed to maliciously disclose the identity of other nodes with a ...
A. Serjantov +18 more
core +1 more source

