Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "Advanced Materials"
DOI: 10.1002/adma.202205365
Abstract: Hardware security is a major concern for the entire semiconductor ecosystem that accounts for billions of dollars in annual losses. Similarly, information security is a critical need for the rapidly proliferating edge devices that continuously…
read more here.
Keywords:
information security;
hardware security;
security;
security primitives ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "Advanced Science"
DOI: 10.1002/advs.202105278
Abstract: Abstract Information security occupies an important position in the era of big data. Attempts to improve the security performance tend to impart them with more additional encryption strategies. Herein, inspired by the wettability feature of…
read more here.
Keywords:
information;
information security;
perovskite nanocrystals;
security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "International Journal of Information Security"
DOI: 10.1007/s10207-018-0416-2
Abstract: Provable security is an important research area in information security and aims to give a mathematical guarantee that a scheme is secure. Primitives or protocols without a rigorous security proof cannot be regarded as secure…
read more here.
Keywords:
information security;
message guest;
guest editors;
security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "Information Systems Frontiers"
DOI: 10.1007/s10796-016-9648-8
Abstract: Research on technological aspects of information security risk is a well-established area and familiar territory for most information security professionals. The same cannot be said about the economic value of information security investments in organisations.…
read more here.
Keywords:
information security;
information;
research;
systematic literature ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "Mobile Networks and Applications"
DOI: 10.1007/s11036-018-0997-z
Abstract: Information hiding is an essential research topic in the theory of hybrid information security. 2D vector map contains a wealth of hybrid information, which requires verification of authenticity and integrity. This paper proposes a novel…
read more here.
Keywords:
vector map;
information security;
hybrid information;
information ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-021-03109-9
Abstract: A field of information security provides an efficiency to manage the records over remote server with proper privacy preserving norms. These kinds of information privacy are required today to maintain ones record into the server…
read more here.
Keywords:
information security;
data security;
security;
blockchain ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2017 at "IFAC-PapersOnLine"
DOI: 10.1016/j.ifacol.2017.08.477
Abstract: Abstract There are important information security problems for system identification, which have not been paid attention to and well studied. In this paper, we discuss the security problem of input information according to a class…
read more here.
Keywords:
system identification;
information;
information security;
security ... See more keywords
Photo from archive.org
Sign Up to like & get
recommendations!
0
Published in 2018 at "Medical hypotheses"
DOI: 10.1016/j.mehy.2018.03.023
Abstract: In recent years, biometric technologies, such as iris, facial, and finger vein recognition, have reached consumers and are being increasingly applied. However, it remains unknown whether these highly specific biometric technologies are as safe as…
read more here.
Keywords:
information security;
era artificial;
medical information;
biometric technologies ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Procedia Manufacturing"
DOI: 10.1016/j.promfg.2019.02.293
Abstract: Abstract Today’s most advanced Industrial systems are built on a very solid information technology basis. To serve and to operate the extremely complex supply chain, the industry needs modern, interconnected infrastructure, where sensors, industrial and…
read more here.
Keywords:
security aspects;
information security;
industry;
information ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Nano letters"
DOI: 10.1021/acs.nanolett.2c01931
Abstract: Thermal activation of upconversion luminescence in nanocrystals opens up new opportunities in biotechnology and nanophotonics. However, it remains a daunting challenge to achieve a smart control of luminescence behavior in the thermal field with remarkable…
read more here.
Keywords:
information security;
upconversion;
erbium sublattice;
upconversion erbium ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "Information Systems Management"
DOI: 10.1080/10580530.2019.1651113
Abstract: ABSTRACT This study explores how aspects of perceived national culture affect the information security attitudes and behavior of employees. Data was collected using 19 semi-structured interviews in Ireland and the United States of America (US).…
read more here.
Keywords:
information security;
information;
security behavior;
irish employees ... See more keywords