CONFIDENTIALITY

作品数:50被引量:26H指数:2
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:罗晓冰更多>>
相关机构:对外经济贸易大学电子科技大学承德卫生学校中国政法大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家高技术研究发展计划国家重点基础研究发展计划更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
A Literature Review: Potential Effects That Health Apps on Mobile Devices May Have on Patient Privacy and Confidentiality
《E-Health Telecommunication Systems and Networks》2024年第3期23-44,共22页Anna Sheri George Jomin George Judy Jenkins 
Purpose: This research aims to evaluate the potential threats to patient privacy and confidentiality posed by mHealth applications on mobile devices. Methodology: A comprehensive literature review was conducted, selec...
关键词:Mobile Devices Patient Privacy Confidentiality Breaches Data Security Data Protection Regulatory Compliance User Consent Data Encryption Third-Party Integration User Awareness 
Improving Smart Home Security via MQTT: Maximizing Data Privacy and Device Authentication Using Elliptic Curve Cryptography
《Computer Systems Science & Engineering》2024年第6期1669-1697,共29页Zainatul Yushaniza Mohamed Yusoff Mohamad Khairi Ishak Lukman A.B.Rahim Mohd Shahrimie Mohd Asaari 
supported through Universiti Sains Malaysia(USM)and the Ministry of Higher Education Malaysia providing the research grant,Fundamental Research Grant Scheme(FRGS-Grant No.FRGS/1/2020/TK0/USM/02/1).
The rapid adoption of Internet of Things(IoT)technologies has introduced significant security challenges across the physical,network,and application layers,particularly with the widespread use of the Message Queue Tel...
关键词:Smart home CONFIDENTIALITY ECC SECURITY lightweight cryptography AUTHENTICATION integrity efficiency 
Utilizing blockchains in opportunistic networks for integrity and confidentiality被引量:1
《Blockchain(Research and Applications)》2024年第1期31-38,共8页Samaneh Rashidibajgan Thomas Hupperich 
Opportunistic networks(OppNets)are usually a set of smart,wearable,and portable devices or entities with mobility that connect wirelessly without requiring infrastructure.Such a network is of great importance in data ...
关键词:Opportunistic networks Blockchain Message integrity Message confidentiality 
An efficient confidentiality protection solution for pub/sub system
《Cybersecurity》2023年第4期14-25,共12页Jinglei Pei Yuyang Shi Qingling Feng Ruisheng Shi Lina Lan Shui Yu Jinqiao Shi Zhaofeng Ma 
This work was supported by the Natural Science Foundation of Beijing Municipality(M21037);Key Technologies Research and Development Program(2022YFF0902701);2022 Industrial Internet Public Service Platform-Industrial Internet Oriented Virtual Currency Mining Governance Public Service Platform Project by the Ministry of Industry and Information Technology of PRC,Major Research and Application Project for the Supervision Platform of Virtual Currency Mining Behavior by the Ministry of Education of PRC,and the 111 Project(Grant No.B21049).
Publish/subscribe(pub/sub)systems are widely used in large-scale messaging systems due to their asynchronous and decoupled nature.With the population of pub/sub cloud services,the privacy protection problem of pub/sub...
关键词:Pub/sub CONFIDENTIALITY Privacy protection SGX SCALABILITY 
Security Test Case Prioritization through Ant Colony Optimization Algorithm
《Computer Systems Science & Engineering》2023年第12期3165-3195,共31页Abdulaziz Attaallah Khalil al-Sulbi Areej Alasiry Mehrez Marzougui Mohd Waris Khan Mohd Faizan Alka Agrawal Dhirendra Pandey 
Deanship of Scientific Research at King Khalid University for funding this work through Large Group Research Project under Grant Number RGP2/249/44.
Security testing is a critical concern for organizations worldwide due to the potential financial setbacks and damage to reputation caused by insecure software systems.One of the challenges in software security testin...
关键词:CONFIDENTIALITY INTEGRITY AUTHENTICATION NON-REPUDIATION RESILIENCE AUTHORIZATION Ant Colony Optimization algorithm 
Securing Stock Transactions Using Blockchain Technology: Architecture for Identifying and Reducing Vulnerabilities Linked to the Web Applications Used (MAHV-BC)
《Open Journal of Applied Sciences》2023年第11期2080-2093,共14页Kpinna Tiekoura Coulibaly Abdou Maïga Jerome Diako Moustapha Diaby 
This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data ...
关键词:Stock Market Transactions Action Smart Contracts ARCHITECTURE Security Vulnerability Web Applications Blockchain and Finance Cryptography Authentication Data Integrity Transaction Confidentiality Trust Economy 
Intrusion Detection in 5G Cellular Network Using Machine Learning
《Computer Systems Science & Engineering》2023年第11期2439-2453,共15页Ishtiaque Mahmood Tahir Alyas Sagheer Abbas Tariq Shahzad Qaiser Abbas Khmaies Ouahada 
Attacks on fully integrated servers,apps,and communication networks via the Internet of Things(IoT)are growing exponentially.Sensitive devices’effectiveness harms end users,increases cyber threats and identity theft,...
关键词:Intrusion detection system machine learning CONFIDENTIALITY INTEGRITY AVAILABILITY 
A Novel Parallel Computing Confidentiality Scheme Based on Hindmarsh-Rose Model
《Computers, Materials & Continua》2023年第8期1325-1341,共17页Jawad Ahmad Mimonah Al Qathrady Mohammed SAlshehri Yazeed Yasin Ghadi Mujeeb Ur Rehman Syed Aziz Shah 
the Deanship of Scientific Research at Najran University for funding this work under the Research Groups Funding Program Grant Code(NU/RG/SERC/12/3).
Due to the inherent insecure nature of the Internet,it is crucial to ensure the secure transmission of image data over this network.Additionally,given the limitations of computers,it becomes evenmore important to empl...
关键词:Hindmarsh-rose model image encryption SHA-256 parallel computing 
The Confidentiality of Coding Video Games with Cheat Code and Bots for Cheating in a Virtual World
《International Journal of Communications, Network and System Sciences》2023年第6期105-114,共10页Samantha Gorton Olatunde Abiona 
Video games have been around for several decades and have had many advancements from the original start of video games. Video games started as virtual games that were advertised towards children, and these virtual gam...
关键词:Video Games CONFIDENTIALITY Virtual World Cheat Code Bots PROGRAMMING 
A comprehensive survey on security issues in vehicle-to-grid networks
《Journal of Control and Decision》2023年第2期150-159,共10页Arun Sekar Rajasekaran Maria Azees Fadi Al-Turjman 
Vehicle to grid(V2G)is the most hopeful approach to transfer energy as well as information in the bidirectional way.V2G network is formed by electric vehicles which connect with smart metres for information and energy...
关键词:AUTHENTICATION CONFIDENTIALITY INTEGRITY PRIVACY SECURITY 
检索报告 对象比较 聚类工具 使用帮助 返回顶部