Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Security solutions“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Security solutions" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Security solutions"
Patil, Dr Dipti D., Dr V. M. Wadhai Dr. V. M. Wadhai und Bhagyashri D. Dangewar. „Cloud Security: Problems and Solutions“. International Journal of Scientific Research 3, Nr. 4 (01.06.2012): 498–500. http://dx.doi.org/10.15373/22778179/apr2014/178.
Der volle Inhalt der QuelleXu, Vincent. „Data Security Solutions“. RESEARCH REVIEW International Journal of Multidisciplinary 05, Nr. 07 (15.07.2020): 4–6. http://dx.doi.org/10.31305/rrijm.2020.v05.i07.002.
Der volle Inhalt der QuelleWebb, K. W. „Biometric Security Solutions“. IEEE Security and Privacy Magazine 3, Nr. 5 (September 2005): 7. http://dx.doi.org/10.1109/msp.2005.117.
Der volle Inhalt der QuelleGOHOREANU, Bogdan, Florin SANDU und Dan-Nicolae ROBU. „SOLUTIONS FOR SECURITY ENHANCEMENTS IN DIGITAL NETWORKS“. SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, Nr. 1 (31.07.2017): 365–70. http://dx.doi.org/10.19062/2247-3173.2017.19.1.44.
Der volle Inhalt der QuelleWEBER, CYNTHIA, und MARK LACY. „Securing by design“. Review of International Studies 37, Nr. 3 (01.03.2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.
Der volle Inhalt der QuelleZakarya, Muhammad, Muazzam Ali Khattak, Izaz Ur Rahman und Ayaz Ali Khan. „Grid High Availability and Service Security Issues with Solutions“. International Journal of Engineering and Technology 4, Nr. 6 (2012): 723–29. http://dx.doi.org/10.7763/ijet.2012.v4.472.
Der volle Inhalt der QuelleGEANĂ, Ionuţ Cătălin. „Security Solutions for Informatics Systems“. International Journal of Information Security and Cybercrime 1, Nr. 2 (21.12.2012): 17–24. http://dx.doi.org/10.19107/ijisc.2012.02.02.
Der volle Inhalt der QuelleDhiman, Deepika. „WLAN Security Issues and Solutions“. IOSR Journal of Computer Engineering 16, Nr. 1 (2014): 67–75. http://dx.doi.org/10.9790/0661-16146775.
Der volle Inhalt der QuelleFausett, Crystal M., Megan P. Christovich, Jarod M. Parker, John M. Baker und Joseph R. Keebler. „Telemedicine Security: Challenges and Solutions“. Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 10, Nr. 1 (Juni 2021): 340–44. http://dx.doi.org/10.1177/2327857921101241.
Der volle Inhalt der QuelleTrubilin, Alexander Ivanovich, Konstantin Eduardovich Tyupakov und Alexander Alexandrovich Adamenko. „Food security: problems and solutions“. Proceedings of the Kuban State Agrarian University, Nr. 90 (2021): 5–10. http://dx.doi.org/10.21515/1999-1703-90-5-10.
Der volle Inhalt der QuelleDissertationen zum Thema "Security solutions"
Mustafa, Ali, Nasir Siddique und Mubeen Zubair. „DATA LINK LAYER SECURITY PROBLEMS AND SOLUTIONS“. Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-27574.
Der volle Inhalt der QuelleAlsaid, Adil. „Enhancing end user security : attacks and solutions“. Thesis, Royal Holloway, University of London, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.439012.
Der volle Inhalt der QuelleBailey, Carmen F. „Analysis of security solutions in large enterprises“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBailey.pdf.
Der volle Inhalt der QuelleHo, Sze-lok, und 何思樂. „Technical solutions for conducting investigations in digital age“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.
Der volle Inhalt der Quellepublished_or_final_version
Computer Science
Master
Master of Philosophy
Alexander, James. „Promoting security imaginaries : an analysis of the market for everyday security solutions“. Thesis, University of Manchester, 2014. https://www.research.manchester.ac.uk/portal/en/theses/promoting-security-imaginaries-an-analysis-of-the-market-for-everyday-security-solutions(1dc57433-40f6-40c1-bd13-56ab2347c35a).html.
Der volle Inhalt der QuelleSkaria, Sherin, und Fazely Hamedani Amir Reza. „Network Security Issues, Tools for Testing Security in Computer Network and Development Solution for Improving Security in Computer Network“. Thesis, Halmstad University, Halmstad University, Halmstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4396.
Der volle Inhalt der QuelleRaza, Shahid. „Lightweight Security Solutions for the Internet of Things“. Doctoral thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-18863.
Der volle Inhalt der QuelleHussein, Soran. „Lightweight Security Solutions for LTE/LTE-A Networks“. Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112366/document.
Der volle Inhalt der QuelleRecently, the 3rd Group Project Partnership (3GPP) has developed Long Term Evolution/ Long Term Evolution-Advanced (LTE/LTE-A) systems which have been approved by the International Telecommunication Union (ITU) as 4th Generation (4G) mobile telecommunication networks. Security is one of critical issues which should be handled carefully to protect user's and mobile operator's information. Thus, the 3GPP has standardized algorithms and protocols in order to secure the communications between different entities of the mobile network. However, increasing the security level in such networks should not compel heavy constrains on these networks such as complexity and energy. Indeed, energy efficiency has become recently a critical need for mobile network operators for reduced carbon emissions and operational costs. The security services in mobile networks such as authentication, data confidentiality and data integrity are mostly performed using cryptographic techniques.However, most of the standardized solutions already adopted by the3GPP depend on encryption algorithms which possess high computational complexity which in turn contributes in consuming further energy at the different network communication parties.Data confidentiality which mainly refers to the protection of the user’s information privacy is achieved at the Packet Data Convergence Protocol (PDCP) sub-layer in the LTE/LTE-A protocol stack by one of the three standardized algorithms (EEA1, EEA2 and EEA3). However, each of the three algorithms requires high computational complexity since they rely on Shannon’s theory of encryption algorithms by applying confusion and diffusion for several rounds. In our thesis we propose a novel confidentiality algorithm using the concept of substitution and diffusion in which the required security level is attained in only one round. Consequently the computational complexity is considerably reduced which in return results in reducing the energy consumption during both encryption and decryption procedures. Similarly, the same approach is used to reduce the complexity of 3GPP data integrity algorithms (EIA1, EIA2 and EIA3) which the core cipher rely on the same complex functions. Finally, we investigate in this thesis the authentication issue in Device to Device paradigms proposal in 4G systems. Device to Device communications refer to direct communications between two mobile devices without passing through the core network. They constitute a promising mean to increase the performance and reduce energy consumptions in LTE/LTE-A networks. In such context, the authentication and key derivation between two mobile devices have not been well investigated. Thus, a novel lightweight authentication and key derivation protocol is proposed to authenticate two communicating devices during session establishments as well as deriving necessary keys for both data encryption and integrity protection
Lejaha, Retselisitsoe. „SDN based security solutions for multi-tenancy NFV“. Master's thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/24474.
Der volle Inhalt der QuelleOkwuibe, J. (Jude). „Performance evaluation of HIP-based network security solutions“. Master's thesis, University of Oulu, 2015. http://jultika.oulu.fi/Record/nbnfioulu-201510102056.
Der volle Inhalt der QuelleBücher zum Thema "Security solutions"
M, Jackson Keith, Hrsg. Computer security solutions. Boca Raton: CRC Press, 1990.
Den vollen Inhalt der Quelle findenHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Den vollen Inhalt der Quelle findenHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Den vollen Inhalt der Quelle findenInc, NetLibrary, Hrsg. Designing security architecture solutions. New York: John Wiley, 2002.
Den vollen Inhalt der Quelle findenMueller, John Paul. .NET Development Security Solutions. New York: John Wiley & Sons, Ltd., 2006.
Den vollen Inhalt der Quelle findenAssociated Chambers of Commerce & Industry of India. Security issues & solutions 2011: Emerging contours of internal security & latest technology solutions. New Delhi: The Associated Chambers of Commerce and Industry of India, 2011.
Den vollen Inhalt der Quelle findenEnterprise security architecture using IBM ISS security solutions. [United States?]: IBM, International Technical Support Organization, 2008.
Den vollen Inhalt der Quelle findenBhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Indianapolis, IN: Cisco Press, 2008.
Den vollen Inhalt der Quelle findenBhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Indianapolis, IN: Cisco Press, 2008.
Den vollen Inhalt der Quelle findenMason, Andrew G. Cisco secure Internet security solutions. Indianapolis, Ind: Cisco Press, 2001.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Security solutions"
Versluis, Gerald, und Steven Thewissen. „Network and Security“. In Xamarin.Forms Solutions, 153–89. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-4134-9_4.
Der volle Inhalt der QuelleSchreck, Jörg. „Solutions for Security“. In Security and Privacy in User Modeling, 95–156. Dordrecht: Springer Netherlands, 2003. http://dx.doi.org/10.1007/978-94-017-0377-2_8.
Der volle Inhalt der QuelleLi, Bin, und David Zhang. „Signature Security System for E-Commerce“. In Biometric Solutions, 187–216. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_8.
Der volle Inhalt der QuelleMorton, Adam. „Managing Security and Access Control“. In Mastering Snowflake Solutions, 67–98. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8029-4_4.
Der volle Inhalt der QuelleMcDonald, Connor, Chaim Katz, Christopher Beck, Joel R. Kallman und David C. Knox. „Security Packages“. In Mastering Oracle PL/SQL: Practical Solutions, 415–62. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0702-3_8.
Der volle Inhalt der QuelleLing, Lee Luan, und Miguel Gustavo Lizárraga. „Biometrics on the Internet: Security Applications and Services“. In Biometric Solutions, 131–67. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_6.
Der volle Inhalt der QuelleYou, Jane, und David Zhang. „Web Guard: A Biometrics Identification System for Network Security“. In Biometric Solutions, 217–41. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_9.
Der volle Inhalt der QuelleAshley, Paul, und Mark Vandenwauver. „Comparison of the Security Solutions“. In Practical Intranet Security, 207–14. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5609-1_10.
Der volle Inhalt der QuelleDe Capitani di Vimercati, Sabrina, und Pierangela Samarati. „Data Privacy – Problems and Solutions“. In Information Systems Security, 180–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77086-2_14.
Der volle Inhalt der QuelleBarde, Snehlata. „Blockchain-Based Cyber Security“. In Transforming Cybersecurity Solutions using Blockchain, 55–69. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6858-3_4.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Security solutions"
Jasser, Stefanie, und Matthias Riebisch. „Reusing security solutions“. In ECSAW '16: European Conference on Software Architecture Workshops. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2993412.3007556.
Der volle Inhalt der QuelleFischer, D., B. Markscheffel und T. Seyffarth. „Smartphone security: Overview of security software solutions“. In 2013 IEEE Third International Conference on Information Science and Technology (ICIST). IEEE, 2013. http://dx.doi.org/10.1109/icist.2013.6747557.
Der volle Inhalt der QuelleFischer, D., B. Markscheffel und T. Seyffarth. „Smartphone security: Overview of security software solutions“. In 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2013. http://dx.doi.org/10.1109/icitst.2013.6750208.
Der volle Inhalt der QuelleHabbak, Hany, Khaled Metwally und Ahmed Maher Mattar. „Securing Big Data: A Survey on Security Solutions“. In 2022 13th International Conference on Electrical Engineering (ICEENG). IEEE, 2022. http://dx.doi.org/10.1109/iceeng49683.2022.9781955.
Der volle Inhalt der QuelleAdibi, S. „Comparative mobile platforms security solutions“. In 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 2014. http://dx.doi.org/10.1109/ccece.2014.6900963.
Der volle Inhalt der QuelleMondol, Joel-Ahmed M. „Cloud security solutions using FPGA“. In 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PacRim). IEEE, 2011. http://dx.doi.org/10.1109/pacrim.2011.6032987.
Der volle Inhalt der QuelleSuomalainen, Jani, und Pasi Hyttinen. „Security Solutions for Smart Spaces“. In 2011 IEEE/IPSJ 11th International Symposium on Applications and the Internet (SAINT). IEEE, 2011. http://dx.doi.org/10.1109/saint.2011.57.
Der volle Inhalt der QuelleSeto, Myron W. L. „Security solutions: strategy and architecture“. In Electronic Imaging 2002, herausgegeben von Rudolf L. van Renesse. SPIE, 2002. http://dx.doi.org/10.1117/12.462723.
Der volle Inhalt der QuelleVenkatesh, P., und M. S. Tasmiya Taranum. „Network Security: Threats and Solutions“. In Third International Conference on Current Trends in Engineering Science and Technology ICCTEST-2017. Grenze Scientific Society, 2017. http://dx.doi.org/10.21647/icctest/2017/49039.
Der volle Inhalt der QuelleSteiner, Wilfried. „Candidate security solutions for TTEthernet“. In 2013 IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC). IEEE, 2013. http://dx.doi.org/10.1109/dasc.2013.6712579.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Security solutions"
Mbemba, Augustin. Central Africa: Salient Security Issues and Uncertain Political Solutions. Fort Belvoir, VA: Defense Technical Information Center, April 2010. http://dx.doi.org/10.21236/ada522104.
Der volle Inhalt der QuelleHowell, Gema. Security Analysis of IoT Management Solutions for First Responders. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.tn.2223.
Der volle Inhalt der QuellePudelek, Jessie, und Kevin Hill. End-User Security: A Cornerstone of Defense-in-Depth Cybersecurity Solutions. Office of Scientific and Technical Information (OSTI), Mai 2019. http://dx.doi.org/10.2172/1524811.
Der volle Inhalt der QuelleSchulzrinne, H., E. Marocco und E. Ivov. Security Issues and Solutions in Peer-to-Peer Systems for Realtime Communications. RFC Editor, Februar 2010. http://dx.doi.org/10.17487/rfc5765.
Der volle Inhalt der QuelleGopalan, Sundararajan Srinivasa, Rajesh Bhatia, Sonalini Khetrapal und Sungsup Ra. Addressing Nutrition Security in Urban India through Multisectoral Action. Asian Development Bank, Februar 2022. http://dx.doi.org/10.22617/wps220057-2.
Der volle Inhalt der QuelleMeijer, Karen, und Katongo Seyuba. The Role of Development Actors in Responding to Environment and Security Links. Stockholm International Peace Research Institute, Dezember 2022. http://dx.doi.org/10.55163/kniz5636.
Der volle Inhalt der QuelleGiordano, Meredith, Charlotte de Fraiture, Elizabeth Weight und Julie van der Bliek. Water for wealth and food security: supporting farmer-driven investments in agricultural water management. Synthesis report of the AgWater Solutions Project. International Water Management Institute (IWMI)., 2012. http://dx.doi.org/10.5337/2012.207.
Der volle Inhalt der QuelleOzano, Kim, Andrew Roby und Jacob Tompkins. Learning Journey on Water Security: UK Water Offer. Institute of Development Studies (IDS), Januar 2022. http://dx.doi.org/10.19088/k4d.2022.026.
Der volle Inhalt der QuelleArtis, Roslyn, Connie Ledoux Book, Jennifer Clinton, John S. Lucas, James P. Pellow und Dawn Michele Whitehead. Advancing Global Stability and U.S. National Security through Peaceful Exchange. The International Coalition (coordinated by The Forum on Education Abroad), März 2021. http://dx.doi.org/10.36366/ic.agsausnstpe.03312021.
Der volle Inhalt der QuelleBlack, Richard, Joshua Busby, Geoffrey D. Dabelko, Cedric de Coning, Hafsa Maalim, Claire McAllister, Melvis Ndiloseh et al. Environment of Peace: Security in a New Era of Risk. Stockholm International Peace Research Institute, Mai 2022. http://dx.doi.org/10.55163/lcls7037.
Der volle Inhalt der Quelle