Results 11 to 20 of about 1,014,505 (247)
Maximizing Sharing of Protected Information
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
S. Dawson +3 more
openaire +3 more sources
Assessment of information security risks of automated system using neuro-fuzzy logic
Objective. Automated systems are widely used in production, and an important criterion for their reliability is information security. The aim of the study is to provide a balance between possible losses as a result of the implementation of threats and ...
A. R. Aydinyan, O. L. Tsvetkova
doaj +1 more source
Protected realizations of quantum information [PDF]
17 ...
openaire +2 more sources
Protecting Privacy of Genomic Information
The ISO/IEC committee in charge of standardizing the well-known MPEG audiovisual standards has launched, in cooperation with the ISO committee on Biotechnology, a new activity for efficient compressed storage and transmission of genomic information. The paper presents proposals for adding privacy and security to such in-progress standards.
Delgado Mercè, Jaime +2 more
openaire +5 more sources
Communicating the protection of information privacy
The world economic system’s transformation from a dominant mass-production model to a mass-customisation model is seen to have created a demand for personal information from consumers.
Yolanda Jordaan, André Cillié Jordaan
doaj +1 more source
Public management and administration in the context of protecting its information space
The dominant problem of the formation of effective principles of public administration in Ukraine is the need for its safe functioning as well as on the administrative, program and procedural level.
A.O. Azarova +4 more
doaj +1 more source
Limitations of passive protection of quantum information [PDF]
The ability to protect quantum information from the effect of noise is one of the major goals of quantum information processing. In this article, we study limitations on the asymptotic stability of quantum information stored in passive $N$-qubit systems.
Pastawski, F. +3 more
openaire +3 more sources
Information relations as an object of criminal law protection in the information society
The rapid development of information and communication technologies and communication networks leads to an intensification of the circulation of information, an increase in the possibilities of its use for destructive purposes and an increase in the ...
Ryma Kliuchko
doaj +1 more source
This text presents considerations regarding control follow-up for persons who have a security clearance, the proceeding being aimed at verifying whether the said person still guarantees the confidentiality of secret information.
Krzysztof Chochowski
doaj +1 more source
The synthesis between face sketches and face photos has important application values in law enforcement and digital entertainment. In cases of a lack of paired sketch-photo data, this paper proposes an unsupervised model to solve the problems of missing ...
Danping Ren, Jiajun Yang, Zhongcheng Wei
doaj +1 more source

