Results 31 to 40 of about 3,206,915 (290)

Improving Both Quantity and Quality: Incentive Mechanism for Social Mobile Crowdsensing Architecture

open access: yesIEEE Access, 2018
Mobile crowdsensing has emerged as an efficient paradigm for performing large-scale sensing tasks. Improving both the quantity and quality of users is still the pivotal problem for mobile crowdsensing system.
Jia Xu   +4 more
doaj   +1 more source

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [PDF]

open access: yes, 2018
Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently.
Caire, Giuseppe   +5 more
core   +2 more sources

Analysis and Improvement of Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Random number generators (RNGs) are essential for cryptographic applications. In most practical applications, the randomness of RNGs is provided by entropy sources.
Shuangyi Zhu   +4 more
doaj   +1 more source

Secure Data of Industrial Internet of Things in a Cement Factory Based on a Blockchain Technology

open access: yesApplied Sciences, 2021
The Industrial Internet of Things (IIoT) has become a pivotal field of development that can increase the efficiency of real-time collection, recording, analysis, and control of the entire activities of various machines, and can actively enhance quality ...
Samir M. Umran   +4 more
doaj   +1 more source

FL-GUARD: A Holistic Framework for Run-Time Detection and Recovery of Negative Federated Learning

open access: yesData Science and Engineering
Federated learning (FL) is a promising approach for learning a model from data distributed on massive clients without exposing data privacy. It works effectively in the ideal federation where clients share homogeneous data distribution and learning ...
Hong Lin   +4 more
doaj   +1 more source

Homomorphic encryption location privacy-preserving scheme based on Markov model

open access: yes网络与信息安全学报, 2017
Homomorphic encryption location privacy-preserving scheme based on Markov mode was proposed to solve the problem of location privacy and query privacy protection in location-based service systems.
Kai ZHOU,Jian-qiong HE   +2 more
doaj   +1 more source

Some Potential Issues with the Security of HTML5 IndexedDB [PDF]

open access: yes, 2014
The new HTML5 standard provides much more access to client resources, such as user location and local data storage. Unfortunately, this greater access may create new security risks that potentially can yield new threats to user privacy and web attacks ...
Ellman, Jeremy   +2 more
core   +1 more source

The HIT Network for Children and Adolescents With CNS Tumors Facilitates Improvements of Diagnostic Assessments, Multimodal Treatments, Individual Counseling, and Research in Germany, Austria, and Switzerland

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background The HIT network was established in 2000 to create a population‐based structure aiming to improve survival rates and reduce late effects for children with central nervous system (CNS) tumors by conducting comprehensive clinical trials.
Stefan Rutkowski   +59 more
wiley   +1 more source

Strengthening Data Security: an Holistic Approach [PDF]

open access: yes, 2008
In the light of heightened concern around data security, this paper highlights some of the measures that can be used to develop and strengthen security in data archiving. The paper includes discussion of the different approaches that can be taken towards
Bolton, S, Woollard, M
core  

Secret Sharing for Cloud Data Security

open access: yes, 2017
Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud ...
Attasena, Varunya   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy