
Search
Search Results
Found 9 items.
1 - 9 of 9 items
Abstract:
In order to improve the security of home residence, this paper studies and designs an intelligent home security alarm system, using STC89C51 single chip microcomputer as the main controller of the security system, and real-time monitoring by controlling the human pyroelectric infrared sensor and smoke sensor in the case of strangers invading the security range... More
Abstract:
Wireless sensor networks convey mission critical data that calls for adequate privacy and security protection. To accomplish this objective, numerous intrusion detection schemes based on machine learning approaches have been developed. In addition, authentication and key agreements techniques have been developed using techniques such as elliptic curve cryptography, bilinear pairing operations, biometrics, fuzzy verifier and... More
Abstract:
The Internet of Things devices and users exchange massive amount of data. Some of these exchanged messages are highly sensitive as they involve organizational, military or patient personally identifiable information. Therefore, many schemes and protocols have been put forward to protect the transmitted messages. The techniques deployed in these schemes may include blockchain, public... More
Abstract: The current health information systems have many challenges such as lack of standard user interfaces, data security and privacy issues, inability to uniquely identify patients across multiple hospital information systems, probable misuse of patient data, high technological costs, resistance to technology deployments in hospital management, lack of data gathering, processing and analysis standardization. All these... More
Abstract:
Wireless sensor networks process and exchange mission-critical data relating to patients' health status. Obviously, any leakages of the sensed data can have serious consequences which can endanger the lives of patients. As such, there is need for strong security and privacy protection of the data in storage as well as the data in transit.... More
Abstract: Cybersecurity is a global goal that is central to national security planning in many countries. One of the most active research fields is design of practices for the development of so-called highly secure software as a kind of protection and reduction of the risks from cyber threats. The use of a secure software product in... More
Abstract:
This review critically examines Li Zhi’s Legal Comparisons and Implications of Cyberspace Security Governance, situating it within ongoing scholarly debates on international law, comparative jurisprudence, and the multidimensional challenges of global cybersecurity. By providing a nuanced textual and comparative analysis of major legal frameworks—ranging from the Tallinn Manual 2.0 to national statutes in the United... More
Abstract:
With the popularity of the Internet and improvement of information technology, digital information sharing increasingly becomes the trend. More and More universities pay attention to the digital campus, and the construction of digital library has become the focus of digital campus. A set of manageable, authenticated and secure solutions are needed for remote access... More
Abstract:
Underwater Wireless Sensor Networks (UWSNs) are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology. However, UWSNs present challenges in processing, energy, and memory storage due to the use of acoustic waves for communication, which results in long delays, significant power consumption, limited bandwidth, and packet loss. This paper provides... More