Discover more insights into Data Security 데이터 보안

Keywords frequently search together with Data Security 데이터 보안

Narrow sentence examples with built-in keyword filters

Data Security sentence examples within grained access control



An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things.


A Lightweight Attribute-Based Access Control Scheme for Intelligent Transportation System With Full Privacy Protection

Data Security sentence examples within wireless sensor network



IoT Based Smart Water Quality Monitoring: Recent Techniques, Trends and Challenges for Domestic Applications


Certificateless Designated Verifier Anonymous Aggregate Signature Scheme for Healthcare Wireless Sensor Networks

Data Security sentence examples within cloud computing environment



Elliptic Curve Layered: A Secure Polyalphabetic Vignere Cryptographic Algorithm for Textual Data


IoT Processing Layer Security



Data Security sentence examples within increasingly important role



40Gbits−1 Data Transmission in an Installed Optical Link Encrypted Using Physical Layer Security Seeded by Quantum Key Distribution


International Law Thinking on Data Security In TikTok Incident

Data Security sentence examples within real time performance



A NEW TECHNIQUE FOR DETERMINING REGION OF INTEREST IN SELECTIVE VIDEO PROTECTION APPROACH


HuRAI: A brain-inspired computational model for human-robot auditory interface

Data Security sentence examples within security network security



A Review on Block chain and Data Mining Based Data Security Methods


Network Security Protection Technology under the Background of Computing Big Data

Data Security sentence examples within digital contact tracing



Digital contact tracing for COVID-19 epidemic emergency management-A case study based on graph database algorithm.


Should Digital Contact Tracing Technologies be used to Control COVID-19? Perspectives from an Australian Public Deliberation

Data Security sentence examples within mobile edge computing



Research on Edge Computing Security Defense of Information Energy System


Intelligent resource allocation in mobile blockchain for privacy and security transactions: a deep reinforcement learning based approach

Data Security sentence examples within Ensure Data Security



Anti interference transmission algorithm of wireless communication data in the last kilometer of substation


CHAPTER 14. Existing Point-of-care Diagnostics: Merits and Demerits

Data Security sentence examples within Ensuring Data Security



Blockchain Techniques for Secure Storage of Data in Cloud Environment


EU Digital Sovereignty

Data Security sentence examples within Big Data Security



Legal Policies for Sustainable Security and Privacy in Big Data and Information sharing- A managerial perspective


Data security governance in the era of big data: status, challenges, and prospects

Data Security sentence examples within Provide Data Security



Secure and Energy-Efficient IoT Systems Using SZ 1.4 and ChaCha12-Poly1305


Efficient privacy-preserving anonymous authentication scheme for human predictive online education system

Data Security sentence examples within Personal Data Security



Analysis of Community Awareness Against Threats to Personal Data Security Through Phishing Websites


Keamanan dan Akses Data Pribadi Penerima Pinjaman Dalam Peer to Peer Lending di Indonesia

Data Security sentence examples within Improve Data Security



Systematic Literature Review on the Use of Trusted Execution Environments to Protect Cloud/Fog-Based Internet of Things Applications


A deep learning- based frechet and dirichlet model for intrusion detection in IWSN

Data Security sentence examples within Enhance Data Security



Design and Implementation of Intelligent Meter Reading System in Smart Power Grid


Trust Hardware Based Secured Privacy Preserving Computation System for Three-Dimensional Data

Data Security sentence examples within High Data Security



Biometric System - Challenges and Future Trends


Autonomous Operation Control of IoT Blockchain Networks

Data Security sentence examples within User Data Security



Accurate Marketing Strategies Based On Data Analytics


Disaster-Aware Dynamic Routing for SDN-Based Multi-Site Data Center Networks

Data Security sentence examples within Cloud Data Security



A Secure Communication With One Time Pad Encryption And Steganography Method In Cloud


An efficient data flow material model based cloud authentication data security and reduce a cloud storage cost using Index-level Boundary Pattern Convergent Encryption algorithm

Data Security sentence examples within Guarantee Data Security



Fast and Secure Location-based Services in Smart Cities on Outsourced Data


Hybrid Pipeline Hardware Architecture Based on Error Detection and Correction for AES

Data Security sentence examples within Medical Data Security



A Privacy-Preservation Scheme based on Mobile Terminals in Internet Medical


Pivotal “New Normal” Telemedicine: secured psychiatric homeopathy medicine transmission in Post-COVID

Data Security sentence examples within Multimedium Data Security



A three-dimensional chaotic map and their applications to digital audio security


A Novel Digital Watermarking Technique for Video Copyright Protection: An Advanced Study

Data Security sentence examples within Providing Data Security



A Secured Storage and Communication System for Cloud Using ECC, Polynomial Congruence and DSA


Blockchain Technology-Based Good Distribution Practice Model of Pharmacy Industry in Indonesia

Data Security sentence examples within Enhancing Data Security



Security-Enhanced 3D Data Encryption Using a Degradable pH-Responsive Hydrogel


A new lightweight cryptographic algorithm for enhancing data security in cloud computing

Data Security sentence examples within Protect Data Security



Privacy-Preserving Spatio-Temporal Keyword Search for Outsourced Location-Based Services


Two-Factor Decryption: A Better Way to Protect Data Security and Privacy

Data Security sentence examples within Protecting Data Security



A robust and lightweight secure access scheme for cloud based E-healthcare services


Certificateless Designated Verifier Anonymous Aggregate Signature Scheme for Healthcare Wireless Sensor Networks

Data Security sentence examples within Regarding Data Security



Using Machine Learning to Inductively Learn Semantic Rules


Tanggung Jawab Notaris Dalam Menjaga Keamanan Digitalisasi Akta

Data Security sentence examples within Healthcare Data Security



A survey on healthcare data security in wireless body area networks


Healthcare and data privacy requirements for e-health cloud: A qualitative analysis of clinician perspectives

Data Security sentence examples within Realize Data Security



Research on Sulfur Hexafluoride Management and Control Based on Radio Frequency Identification Method


ASIDL : A method for publishing missing data based on decomposition and slicing

Data Security sentence examples within Patient Data Security



Safe clinical photography: best practice guidelines for risk management and mitigation


Radial kernelized regressive merkle-damgård cryptographic hash blockchain for secure data transmission with IoT sensor node

Data Security sentence examples within Compromising Data Security



Dengue models based on machine learning techniques: A systematic literature review


A novel minimal distortion-based edge adaptive image steganography scheme using local complexity

Data Security sentence examples within Digital Data Security



Joint Encryption and Compression-Based Watermarking Technique for Security of Digital Documents


Enhanced AES algorithm based on 14 rounds in securing data and minimizing processing time

Data Security sentence examples within Better Data Security



Modeling and Analysis of Translation Ability of Applied English Talents Based on Data Mining Algorithm


A Blockchain-Based Streaming Data Sharing Scheme with Incentives and Trust Access Control

Data Security sentence examples within Health Data Security



Precision Health Data: Requirements, Challenges and Existing Techniques for Data Security and Privacy


Introduction to the Special Issue on Recent Trends in Medical Data Security for e-Health Applications

Data Security sentence examples within Concerning Data Security



The ethics of shared Covid-19 risks: an epistemological framework for ethical health technology assessment of risk in vaccine supply chain infrastructures


Cyber Security Solutions for Businesses in Financial Services

Data Security sentence examples within New Data Security



Research on Framework of Smart Grid Data Secure Storage from Blockchain Perspective


Data Protection for Files and Logs in Fog Cloud Storage Using 3DES

Data Security sentence examples within Sensitive Data Security



Research on Intelligent Recognition and Tracking Technology of Sensitive Data for Electric Power Big Data


Application of Wireless Sensor Networks in the Sensitive Data Security of Intelligent Data Center under the Big Data Environment

Data Security sentence examples within Maintain Data Security



Utilizing of the Trello API Within the Development of a Monitoring Information System Recording of Project Activities Using a Website-Based Kanban System (Case Study : Electrical Project of PT. XYZ)


Overview of Five Techniques Used for Security and Privacy Insurance in Smart Cities

Data Security sentence examples within Image Data Security



A study and analysis of image security algorithms and the current challenges


Using Boltzmann Entropy to Measure Scrambling Degree of Grayscale Images

Data Security sentence examples within Network Data Security



Preventive Measures of Influencing Factors of Computer Network Security Technology


Research on Network Data Security Based on RS-PS Support Vector Machine (SVM)

Data Security sentence examples within Increase Data Security



Smart Contract-Based Agricultural Food Supply Chain Traceability


Claims Solutions Using a Blockchain System in International Logistics

Data Security sentence examples within Level Data Security



Energetic Data Security Management Scheme using Hybrid Encryption Algorithm over Cloud Environment


China Stroke Registry for Patients With Traditional Chinese Medicine (CASES-TCM): Rationale and Design of a Prospective, Multicenter, Observational Study

Data Security sentence examples within Make Data Security



A Multi-Image Cryptosystem Using Quantum Walks and Chebyshev Map


PPIS-JOIN: A Novel Privacy-Preserving Image Similarity Join Method

Data Security sentence examples within Addres Data Security



Achieving Effective Secrecy based on Blockchain and Data Sharing in Cloud Computing


CL-ME: Efficient Certificateless Matchmaking Encryption for Internet of Things

Data Security sentence examples within Managing Data Security



The impact of Artificial Intelligence on Data System Security: A Literature Review


The Impact of Artificial Intelligence on Data System Security: A Literature Review

Data Security sentence examples within Improved Data Security



Brief Paper: Secret Key and Tag Generation for IIoT Systems Based on Edge Computing


Going Digital: Added Value of Electronic Data Collection in 2018 Afghanistan Health Survey

Data Security sentence examples within Variou Data Security



Tutorial for Integrating Experimental Lab Studies Online Through AWS


Facile and Equipment-Free Data Encryption and Decryption by Self-Encrypting Pt(II) Complex.

Data Security sentence examples within Face Data Security



Secure Storage Auditing With Efficient Key Updates for Cognitive Industrial IoT Environment


Blockchain-Based Outsourced Storage Schema in Untrusted Environment

Data Security sentence examples within Strong Data Security



Omnichannel Strategy an Innovation of Marketing in New Normal Era


Multilevel authentication and key agreement protocol for D2D communication in LTE based C-IoT network

Data Security sentence examples within Dynamic Data Security



Optimized dynamic storage of data (ODSD) in IoT based on blockchain for wireless sensor networks


High-Efficiency Parallel Cryptographic Accelerator for Real-Time Guaranteeing Dynamic Data Security in Embedded Systems

Data Security sentence examples within Rfid Data Security



Application of chaotic encryption algorithm based on variable parameters in RFID security


Taguard: Exposing the Location of Active Eavesdropper in Passive RFID System

Data Security 데이터 보안


Data Security 데이터 보안
Encyclopedia 백과사전