Gotowa bibliografia na temat „Security solution”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Security solution”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Security solution"

1

Meyer, Helen. "Security risk or security solution?" Computers & Security 15, no. 4 (1996): 317. http://dx.doi.org/10.1016/0167-4048(96)88943-7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Shukla, Surabhi. "Public Cloud Security Challenges & Solution." International Journal of Scientific Engineering and Research 3, no. 4 (2015): 111–17. https://doi.org/10.70729/ijser15100.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Li, Yunfa, Yifei Tu, Jiawa Lu, and Yunchao Wang. "A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things." Sensors 20, no. 3 (2020): 916. http://dx.doi.org/10.3390/s20030916.

Pełny tekst źródła
Streszczenie:
With the rapid development of the Internet of Things (IoT), the number of IoT devices has increased exponentially. Therefore, we have put forward higher security requirements for the management, transmission, and storage of massive IoT data. However, during the transmission process of IoT data, security issues, such as data theft and forgery, are prone to occur. In addition, most existing data storage solutions are centralized, i.e., data are stored and maintained by a centralized server. Once the server is maliciously attacked, the security of IoT data will be greatly threatened. In view of t
Style APA, Harvard, Vancouver, ISO itp.
4

Tyler, Neil. "Pre-Provisioned Security Solution." New Electronics 51, no. 18 (2019): 8. http://dx.doi.org/10.12968/s0047-9624(22)61427-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Čuřík, Peter, Roderik Ploszek, and Pavol Zajac. "Practical Use of Secret Sharing for Enhancing Privacy in Clouds." Electronics 11, no. 17 (2022): 2758. http://dx.doi.org/10.3390/electronics11172758.

Pełny tekst źródła
Streszczenie:
The topic of this contribution is the practical use of secret sharing schemes in securing private data. In the first part, we focus on the security model and the overview of the available solutions. In the second part, we describe our solution for storing sensitive data in commercial cloud storage systems, an application called Datachest. The application uploads the data in encrypted form. Cryptographic keys are divided into shares. Each cloud receives one share. This solution improves the security of users’ sensitive data in the cloud. In the final part, we explore the ramifications of secret
Style APA, Harvard, Vancouver, ISO itp.
6

BS, Guru Prasad, Dr Kiran GM, and Dr Dinesha HA. "AI-Driven cyber security: Security intelligence modelling." International Journal of Multidisciplinary Research and Growth Evaluation 4, no. 6 (2023): 961–65. http://dx.doi.org/10.54660/.ijmrge.2023.4.6.961-965.

Pełny tekst źródła
Streszczenie:
The process of defending computer networks from cyber attacks or unintended, unauthorized access is known as cyber security. Organizations, businesses, and governments need cyber security solutions because cyber criminals pose a threat to everyone. Artificial intelligence promises to be a great solution for this. Security experts are better able to defend vulnerable networks and data from cyber attackers by combining the strengths of artificial intelligence and cyber security. This paper provides an introduction to the use of artificial intelligence in cyber security. AI-driven cyber security
Style APA, Harvard, Vancouver, ISO itp.
7

Stashchuk, Olena, and Rostyslav Martyniuk. "Banking innovations: security technology solution." VUZF Review 6, no. 1 (2021): 79–86. http://dx.doi.org/10.38188/2534-9228.21.6.08.

Pełny tekst źródła
Streszczenie:
The article identifies the essence of the concept of banking innovations and their role in the financial security of banking institutions. Features of development of technological banking innovations in Ukraine, including in the conditions of influence of COVID-19 are considered. The characteristics of banking innovations are considered, the criteria to be met by banking innovations both on the part of the client and on the part of the bank are identified. The classification of banking innovations according to such features as: by time aspect, by novelty, by causes of occurrence, by volume of
Style APA, Harvard, Vancouver, ISO itp.
8

Sharma,, Rajani, and Rajender Kumar Trivedi. "Literature review: Cloud Computing –Security Issues, Solution and Technologies." International Journal of Engineering Research 3, no. 4 (2014): 221–25. http://dx.doi.org/10.17950/ijer/v3s4/408.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Oliveira, Vítor, António Coelho, Rui Guimarães, and Carlos Rebelo. "Serious Game in Security: A Solution for Security Trainees." Procedia Computer Science 15 (2012): 274–82. http://dx.doi.org/10.1016/j.procs.2012.10.079.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Kandpal, Meenakshi, Yash Pritwani, Chinmaya Misra, Amrendra Yadav, and Rabindra Barik. "Towards data storage scheme in blockchain based serverless environment: AES encryption and decryption algorithm approach." Facta universitatis - series: Electronics and Energetics 37, no. 2 (2024): 317–42. http://dx.doi.org/10.2298/fuee2402317k.

Pełny tekst źródła
Streszczenie:
In today's digital age, data storage has become an increasingly important issue. The exponential growth of data has led to the need for secure and private storage solutions. Unfortunately, without a standardized protocol, the security and privacy of sensitive data can be a challenge. However, blockchain technology has emerged as a promising solution for secure data storage. Blockchain's decentralized and immutable nature provides a comprehensive solution for the security and privacy of all types of data. In this research, we propose an innovative framework that leverages the benefits of blockc
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Security solution"

1

Wullenweber, Emily Rose Stephens John D. "Biofuels the security threats of a security solution /." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2123.

Pełny tekst źródła
Streszczenie:
Thesis (M.A.)--University of North Carolina at Chapel Hill, 2008.<br>Title from electronic title page (viewed Feb. 17, 2009). "... in partial fulfillment of the requirements for the degree of Master of Arts in the Department of Political Science, Concentration TransAtlantic Studies." Discipline: Political Science; Department/School: Political Science.
Style APA, Harvard, Vancouver, ISO itp.
2

Hensley, Katrina Ludden Fredrick. "ATM security via "Stargate" solution /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA370810.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Computer Science) Naval Postgraduate School, September 1999.<br>"September 1999". Thesis advisor(s): Geoffrey G. Xie. Includes bibliographical references (p. 71-72). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
3

Hensley, Katrina, and Fredrick Ludden. "ATM security via "Stargate" solution." Thesis, Monterey, California: Naval Postgraduate School, 1999. http://hdl.handle.net/10945/13683.

Pełny tekst źródła
Streszczenie:
Approved for public release, distribution unlimited.<br>In today's world of integrating voice, video and data into a single network, Asynchronous Transfer Mode (ATM) networks have become prevalent in the Department of Defense. The Department of Defense's critical data will have to pass through public networks, which causes concern for security. This study presents an efficient solution aimed at authenticating communications over public ATM networks. The authenticating device, Stargate, utilizes a high speed, low level authentication protocol that offers the low cost, flexibility, and extensibi
Style APA, Harvard, Vancouver, ISO itp.
4

Skaria, Sherin, and Fazely Hamedani Amir Reza. "Network Security Issues, Tools for Testing Security in Computer Network and Development Solution for Improving Security in Computer Network." Thesis, Halmstad University, Halmstad University, Halmstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4396.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Marcos, Conca Alexandre. "A Solution to Selecting Cyber-Security Software Tools for an Organization Using Security Controls." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-205272.

Pełny tekst źródła
Streszczenie:
In the last decade, cyber-threats have evolved dramatically, forcing organizations yearafter year to use increasingly sophisticated security measures, security software amongothers. This has led to a huge increase in the number of security tools available in theindustry. The result of the increase is that that companies often do not know in whichsoftware to invest in order to meet their security needs. The purpose of this thesis isto address this problem by developing a solution that helps companies to choose theright security software based on their security needs and that allows to do the se
Style APA, Harvard, Vancouver, ISO itp.
6

Ng, Yu Loon. "Short Message Service (SMS) security solution for mobile devices." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FNg%5FYu.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2006.<br>Thesis Advisor(s): Gurminder Singh, John Gibson. "December 2006." Includes bibliographical references (p. 91-94). Also available in print.
Style APA, Harvard, Vancouver, ISO itp.
7

Somasekaram, Premathas. "Designing a Business Intelligence Solution for Analyzing Security Data." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-208685.

Pełny tekst źródła
Streszczenie:
Business Intelligence is a set of tools and applications that are widely deployed across major corporations today. An appropriate translation for “Business Intelligence” in Swedish is “beslutstöd”, and it clearly describes the purpose of such a solution, andt hat is to collect, compress, consolidate and analyze data from multiple sources, so that critical decisions can be made based on it hence the name “beslutstöd. The focusof Business Intelligence has been on business data, so that trends and patterns of sales, marketing, production and other business areas can be studied. In addition, based
Style APA, Harvard, Vancouver, ISO itp.
8

Wilson, Freya Louise. "A solution for post quantum security using existing communications infrastructures." Thesis, University of Leeds, 2017. http://etheses.whiterose.ac.uk/20820/.

Pełny tekst źródła
Streszczenie:
The application of quantum cryptographic methods to existing communications infrastructures can be extremely difficult owing to the complex nature of quantum transmission methods. The premise of this thesis is an examination of methods to combine quantum-safe security with standard protocols, such as phase shift keying. Use is made of an algorithm previously presented by Ueli Maurer which allows for the distillation of a mutual symmetric cryptographic key from some shared secret information (Maurer, 1993). This algorithm is examined extensively and incorporated into a complete protocol which c
Style APA, Harvard, Vancouver, ISO itp.
9

Rajendran, Ashok. "Security Analysis of a Software Defined Wide Area Network Solution." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-190193.

Pełny tekst źródła
Streszczenie:
Enterprise wide area network (WAN) is a private network that connects the computers and other devices across an organisation's branch locations and the data centers. It forms the backbone of enterprise communication. Currently, multiprotocol label switching (MPLS) is commonly used to provide this service. As a recent alternative to MPLS, software-dened wide area networking (SD-WAN) solutions are being introduced as an IP based cloud-networking service for enterprises. SD-WAN virtualizes the networking service and eases the complexity of conguring and managing the enterprise network by moving t
Style APA, Harvard, Vancouver, ISO itp.
10

Ahmad, Nadeem, and M. Kashif Habib. "Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of a Security Network Monitoring Solution." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5327.

Pełny tekst źródła
Streszczenie:
Communication of confidential data over the internet is becoming more frequent every day. Individuals and organizations are sending their confidential data electronically. It is also common that hackers target these networks. In current times, protecting the data, software and hardware from viruses is, now more than ever, a need and not just a concern. What you need to know about networks these days? How security is implemented to ensure a network? How is security managed? In this paper we will try to address the above questions and give an idea of where we are now standing with the security o
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Książki na temat "Security solution"

1

author, Nguyen Hung, Romero Stephanie author, Levison Jakob author, and Selga Dominici author, eds. WordPress: Brute security & Bot defense solution. National University, 2013.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Astutiningtyas, Elisabeth Tri. Energy poverty: Fact & solution. IESR, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Institute for Essential Services Reform. Energy poverty: Fact and solution. Institute for Essential Services Reform, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Mourani, Gerhard. Securing & optimizing Linux: The ultimate solution. Open Network Architecture Inc., 2001.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Beard, Sam. Restoring hope in America: The social security solution. Institute for Contemporary Studies, 1996.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Zhen, Jiang, and Pan Yi, eds. From problem to solution: Wireless sensor networks security. Nova Science, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

American Bar Association. Standing Committee on Law and National Security. and American Bar Association Meeting, eds. National security leaks: Is there a legal solution?. American Bar Association, Standing Committee on Law and National Security, 1986.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

International Business Machines Corporation. International Technical Support Organization, ed. Designing for solution-based security on z/OS. IBM, International Technical Support Organization, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Joe, McGraw, and Lauchengco Duane, eds. The sovereignty solution: A common sense approach to global security. Naval Institute Press, 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Security, Inter-American Conference on Social. Financing problems and options for a solution: The Americas social security report, 2002. Inter-American Conference on Social Security, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Części książek na temat "Security solution"

1

Welsh, Sean. "Solution design." In Ethics and Security Automata. Routledge, 2017. http://dx.doi.org/10.4324/9781315168951-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Neelakrishnan, Priyanka. "Data Security Solution Design." In Autonomous Data Security. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0838-8_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Zhang, Weijia, and Tej Anand. "Security Considerations." In Blockchain and Ethereum Smart Contract Solution Development. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8164-2_8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Yang, Haomiao, Hongwei Li, and Xuemin Sherman Shen. "Complete ADS-B Security Solution." In Secure Automatic Dependent Surveillance-Broadcast Systems. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07021-1_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Thomas, Shince, Devesh Misra, P. R. Lakshmi Eswari, and N. Sarat Chandra Babu. "A Transparent End-to-End Security Solution." In Information Systems Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11593980_28.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Hernandez Fernandez, Javier, Aymen Omri, and Roberto Di Pietro. "PLC Network Integrity Solution." In Physical Layer Security in Power Line Communications. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57349-1_9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Chorghe, Sharvari Prakash, and Narendra Shekokar. "A Solution to Detect Phishing in Android Devices." In Information Systems Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49806-5_25.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Choi, SuGil, Kwangjo Kim, and ByeongGon Kim. "Practical Solution for Location Privacy in Mobile IPv6." In Information Security Applications. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24591-9_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Radha, V., and N. Hemanth Kumar. "EISA – An Enterprise Application Security Solution for Databases." In Information Systems Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11593980_12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Abdul Based, Md. "Information Handling in Security Solution Decisions." In Innovations and Advances in Computer Sciences and Engineering. Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-3658-2_67.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Security solution"

1

Qatinah, Shatha Hameed, and Ibrahim Ahmed Al-Baltah. "Kerberos Protocol: Security Attacks and Solution." In 2024 1st International Conference on Emerging Technologies for Dependable Internet of Things (ICETI). IEEE, 2024. https://doi.org/10.1109/iceti63946.2024.10777133.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Chiș, Alexandru, Titus-Constantin Bălan, Petru-Adrian Cotfas, and Daniel-Tudor Cotfas. "Deployment of a security solution for cloud." In 2024 15th International Conference on Communications (COMM). IEEE, 2024. http://dx.doi.org/10.1109/comm62355.2024.10741412.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Kumar, Arvind, Ashish Gholve, and Kedar Kotalwar. "Automotive Security Solution Using Hardware Security Module (HSM)." In International Automotive CAE Conference – Road to Virtual World. SAE International, 2024. http://dx.doi.org/10.4271/2024-28-0037.

Pełny tekst źródła
Streszczenie:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;In today’s world, Vehicles are no longer mechanically dominated, with increased complexity, features and autonomous driving capabilities, vehicles are getting connected to internal and external environment e.g., V2I(Vehicle-to-Infrastructure), V2V(Vehicle-to-Vehicle), V2C(Vehicle-to-Cloud) and V2X(Vehicle-to-Everything). This has pushed classical automotive system in background and vehicle components are now increasingly dominated by software’s. Now more focus is made on to increase self-decision-making capabilities of a
Style APA, Harvard, Vancouver, ISO itp.
4

Yassine, Hicham, and Mohammad Malli. "A Lightweight IoT Security Solution." In 2019 15th International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, 2019. http://dx.doi.org/10.1109/iwcmc.2019.8766687.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Liu, W., and E. K. Park. "e-Healthcare Security Solution Framework." In 2012 21st International Conference on Computer Communications and Networks - ICCCN 2012. IEEE, 2012. http://dx.doi.org/10.1109/icccn.2012.6289239.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Jaigirdar, Fariha Tasmin. "Trust based Security Solution for Internet of Things Healthcare Solution." In UbiComp '18: The 2018 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 2018. http://dx.doi.org/10.1145/3267305.3277810.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Xu, Yuanyuan, and He Yang. "Security Solution Based on WSO2 IS." In 2015 International Conference on Advances in Mechanical Engineering and Industrial Informatics. Atlantis Press, 2015. http://dx.doi.org/10.2991/ameii-15.2015.35.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Werapun, W., A. Abou El Kalam, B. Paillassa, and J. Fasson. "Solution analysis for SIP security threats." In 2009 International Conference on Multimedia Computing and Systems (ICMCS). IEEE, 2009. http://dx.doi.org/10.1109/mmcs.2009.5256707.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Wu, Kai-xing, and Han Xi. "Research on AJAX Security and Solution." In Proceedings of the International Conference. World Scientific Publishing Company, 2008. http://dx.doi.org/10.1142/9789812799524_0320.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Newaz, Nishat Tasnim, Mohammad Rafiqul Haque, Tajim Md Niamat Ullah Akhund, Tania Khatun, Milon Biswas, and Mohammad Abu Yousuf. "IoT Security Perspectives and Probable Solution." In 2021 Fifth World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). IEEE, 2021. http://dx.doi.org/10.1109/worlds451998.2021.9513997.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Security solution"

1

Mattila, Petri. Finland's Security Solution in the Future. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada589427.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Shah, Viren. An Aspect-Oriented Security Assurance Solution. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada419305.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Pruet, Andres. The National Security Data Solution (NSDS). Office of Scientific and Technical Information (OSTI), 2022. http://dx.doi.org/10.2172/1878003.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Mylrea, Michael, Sri Nikhil Gourisetti, Judah Plummer, et al. Keyless Infrastructure Security Solution (Kiss): Examining Security and Trust Gaps. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1827741.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Mylrea, Michael, Sri Nikhil Gourisetti, and Heather Culley. Keyless Infrastructure Security Solution (KISS) Technology Landscape Analysis Report. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1826603.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Chiang, Hsiao-Dong. High Performance Solution for Security Constrained Optimal Power Flow. Office of Scientific and Technical Information (OSTI), 2022. http://dx.doi.org/10.2172/1863594.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Chiang, Hsiao-Dong. High Performance Solution for Security Constrained Optimal Power Flow. Office of Scientific and Technical Information (OSTI), 2022. http://dx.doi.org/10.2172/1863594.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Perkins, C., and M. Westerlund. Securing the RTP Framework: Why RTP Does Not Mandate a Single Media Security Solution. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7202.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Mylrea, Michael, Sri Nikhil Gourisetti, Vinod Tatireddy, et al. Keyless Infrastructure Security Solution (KISS): VOLTRON KSI Blockchain Design and Specification. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1828066.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Šulus, Vytautas, and Pavel Voitkun. Prototype of the Electronic Voting System. Security Implementations Using Database Facilities. Vilnius Business College, 2024. https://doi.org/10.57005/ab.2024.3.4.

Pełny tekst źródła
Streszczenie:
Electronic Voting Systems (EVS) has become more popular and has progressed despite many concerns about auditing and transparency. Authors present a technical solution for a prototype of a possible EVS. This prototype, with additional improvements, could be used as an EVS in Lithuania and other countries worldwide. This article is intended to show how EVS requirements relate to software solutions using open-source products.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!