Results 231 to 240 of about 3,206,915 (290)
Dentists' awareness of data security and ethical issues during the transition to artificial intelligence-driven clinical practice. [PDF]
Ozbey F, Gokkurt Yilmaz BN, Yilmaz BE.
europepmc +1 more source
QRBT: Quantum Driven Reinforcement Learning for Scalable Blockchain Transaction Processing. [PDF]
Lella KK, Mallu SRK.
europepmc +1 more source
BBAS: A blockchain-based authentication system for e-health with multi-factor authentication, access control, and post-quantum security. [PDF]
Latif R +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the 3rd International Conference on Smart City Applications, 2018
The smart city is a new concept of urban development. It is about improving the life quality of city dwellers by making the city more adaptive and efficient, using new technologies that rely on an ecosystem of objects and services. The scope covering this new mode of city management includes: public infrastructures (buildings, street furniture, home ...
Naoufal Ainane +2 more
openaire +1 more source
The smart city is a new concept of urban development. It is about improving the life quality of city dwellers by making the city more adaptive and efficient, using new technologies that rely on an ecosystem of objects and services. The scope covering this new mode of city management includes: public infrastructures (buildings, street furniture, home ...
Naoufal Ainane +2 more
openaire +1 more source
Ontology Security Strategy of Security Data Integrity
2009 Fourth International Conference on Internet Computing for Science and Engineering, 2009There exists a variety of heterogeneous data that need to be integrated within a secure domain. How to integrate the security data from various data source safely is a challenge for database researchers. In this paper, we introduce a new model for security data integrity, Weight-value-Extended MLS (WEMLS), which is development based on MLS.
Yulong Meng, Guisheng Yin, Ke Geng
openaire +1 more source
Information Systems Security, 2006
Abstract If your company is like many others, you have put a lot of effort into securing your information systems. You've implemented technology and procedures at great expense, but you may be omitting an important last step: secure off-site storage.
openaire +1 more source
Abstract If your company is like many others, you have put a lot of effort into securing your information systems. You've implemented technology and procedures at great expense, but you may be omitting an important last step: secure off-site storage.
openaire +1 more source

