Добірка наукової літератури з теми "Security solutions"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Security solutions".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Security solutions"
Patil, Dr Dipti D., Dr V. M. Wadhai Dr. V. M. Wadhai, and Bhagyashri D. Dangewar. "Cloud Security: Problems and Solutions." International Journal of Scientific Research 3, no. 4 (June 1, 2012): 498–500. http://dx.doi.org/10.15373/22778179/apr2014/178.
Повний текст джерелаXu, Vincent. "Data Security Solutions." RESEARCH REVIEW International Journal of Multidisciplinary 05, no. 07 (July 15, 2020): 4–6. http://dx.doi.org/10.31305/rrijm.2020.v05.i07.002.
Повний текст джерелаWebb, K. W. "Biometric Security Solutions." IEEE Security and Privacy Magazine 3, no. 5 (September 2005): 7. http://dx.doi.org/10.1109/msp.2005.117.
Повний текст джерелаGOHOREANU, Bogdan, Florin SANDU, and Dan-Nicolae ROBU. "SOLUTIONS FOR SECURITY ENHANCEMENTS IN DIGITAL NETWORKS." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, no. 1 (July 31, 2017): 365–70. http://dx.doi.org/10.19062/2247-3173.2017.19.1.44.
Повний текст джерелаWEBER, CYNTHIA, and MARK LACY. "Securing by design." Review of International Studies 37, no. 3 (March 1, 2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.
Повний текст джерелаZakarya, Muhammad, Muazzam Ali Khattak, Izaz Ur Rahman, and Ayaz Ali Khan. "Grid High Availability and Service Security Issues with Solutions." International Journal of Engineering and Technology 4, no. 6 (2012): 723–29. http://dx.doi.org/10.7763/ijet.2012.v4.472.
Повний текст джерелаGEANĂ, Ionuţ Cătălin. "Security Solutions for Informatics Systems." International Journal of Information Security and Cybercrime 1, no. 2 (December 21, 2012): 17–24. http://dx.doi.org/10.19107/ijisc.2012.02.02.
Повний текст джерелаDhiman, Deepika. "WLAN Security Issues and Solutions." IOSR Journal of Computer Engineering 16, no. 1 (2014): 67–75. http://dx.doi.org/10.9790/0661-16146775.
Повний текст джерелаFausett, Crystal M., Megan P. Christovich, Jarod M. Parker, John M. Baker, and Joseph R. Keebler. "Telemedicine Security: Challenges and Solutions." Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 10, no. 1 (June 2021): 340–44. http://dx.doi.org/10.1177/2327857921101241.
Повний текст джерелаTrubilin, Alexander Ivanovich, Konstantin Eduardovich Tyupakov, and Alexander Alexandrovich Adamenko. "Food security: problems and solutions." Proceedings of the Kuban State Agrarian University, no. 90 (2021): 5–10. http://dx.doi.org/10.21515/1999-1703-90-5-10.
Повний текст джерелаДисертації з теми "Security solutions"
Mustafa, Ali, Nasir Siddique, and Mubeen Zubair. "DATA LINK LAYER SECURITY PROBLEMS AND SOLUTIONS." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-27574.
Повний текст джерелаAlsaid, Adil. "Enhancing end user security : attacks and solutions." Thesis, Royal Holloway, University of London, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.439012.
Повний текст джерелаBailey, Carmen F. "Analysis of security solutions in large enterprises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBailey.pdf.
Повний текст джерелаHo, Sze-lok, and 何思樂. "Technical solutions for conducting investigations in digital age." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.
Повний текст джерелаpublished_or_final_version
Computer Science
Master
Master of Philosophy
Alexander, James. "Promoting security imaginaries : an analysis of the market for everyday security solutions." Thesis, University of Manchester, 2014. https://www.research.manchester.ac.uk/portal/en/theses/promoting-security-imaginaries-an-analysis-of-the-market-for-everyday-security-solutions(1dc57433-40f6-40c1-bd13-56ab2347c35a).html.
Повний текст джерелаSkaria, Sherin, and Fazely Hamedani Amir Reza. "Network Security Issues, Tools for Testing Security in Computer Network and Development Solution for Improving Security in Computer Network." Thesis, Halmstad University, Halmstad University, Halmstad University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4396.
Повний текст джерелаRaza, Shahid. "Lightweight Security Solutions for the Internet of Things." Doctoral thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-18863.
Повний текст джерелаHussein, Soran. "Lightweight Security Solutions for LTE/LTE-A Networks." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112366/document.
Повний текст джерелаRecently, the 3rd Group Project Partnership (3GPP) has developed Long Term Evolution/ Long Term Evolution-Advanced (LTE/LTE-A) systems which have been approved by the International Telecommunication Union (ITU) as 4th Generation (4G) mobile telecommunication networks. Security is one of critical issues which should be handled carefully to protect user's and mobile operator's information. Thus, the 3GPP has standardized algorithms and protocols in order to secure the communications between different entities of the mobile network. However, increasing the security level in such networks should not compel heavy constrains on these networks such as complexity and energy. Indeed, energy efficiency has become recently a critical need for mobile network operators for reduced carbon emissions and operational costs. The security services in mobile networks such as authentication, data confidentiality and data integrity are mostly performed using cryptographic techniques.However, most of the standardized solutions already adopted by the3GPP depend on encryption algorithms which possess high computational complexity which in turn contributes in consuming further energy at the different network communication parties.Data confidentiality which mainly refers to the protection of the user’s information privacy is achieved at the Packet Data Convergence Protocol (PDCP) sub-layer in the LTE/LTE-A protocol stack by one of the three standardized algorithms (EEA1, EEA2 and EEA3). However, each of the three algorithms requires high computational complexity since they rely on Shannon’s theory of encryption algorithms by applying confusion and diffusion for several rounds. In our thesis we propose a novel confidentiality algorithm using the concept of substitution and diffusion in which the required security level is attained in only one round. Consequently the computational complexity is considerably reduced which in return results in reducing the energy consumption during both encryption and decryption procedures. Similarly, the same approach is used to reduce the complexity of 3GPP data integrity algorithms (EIA1, EIA2 and EIA3) which the core cipher rely on the same complex functions. Finally, we investigate in this thesis the authentication issue in Device to Device paradigms proposal in 4G systems. Device to Device communications refer to direct communications between two mobile devices without passing through the core network. They constitute a promising mean to increase the performance and reduce energy consumptions in LTE/LTE-A networks. In such context, the authentication and key derivation between two mobile devices have not been well investigated. Thus, a novel lightweight authentication and key derivation protocol is proposed to authenticate two communicating devices during session establishments as well as deriving necessary keys for both data encryption and integrity protection
Lejaha, Retselisitsoe. "SDN based security solutions for multi-tenancy NFV." Master's thesis, University of Cape Town, 2017. http://hdl.handle.net/11427/24474.
Повний текст джерелаOkwuibe, J. (Jude). "Performance evaluation of HIP-based network security solutions." Master's thesis, University of Oulu, 2015. http://jultika.oulu.fi/Record/nbnfioulu-201510102056.
Повний текст джерелаКниги з теми "Security solutions"
M, Jackson Keith, ed. Computer security solutions. Boca Raton: CRC Press, 1990.
Знайти повний текст джерелаHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Знайти повний текст джерелаHruska, Jan. Computer security solutions. Oxford: Blackwell Scientific, 1990.
Знайти повний текст джерелаInc, NetLibrary, ed. Designing security architecture solutions. New York: John Wiley, 2002.
Знайти повний текст джерелаMueller, John Paul. .NET Development Security Solutions. New York: John Wiley & Sons, Ltd., 2006.
Знайти повний текст джерелаAssociated Chambers of Commerce & Industry of India. Security issues & solutions 2011: Emerging contours of internal security & latest technology solutions. New Delhi: The Associated Chambers of Commerce and Industry of India, 2011.
Знайти повний текст джерелаEnterprise security architecture using IBM ISS security solutions. [United States?]: IBM, International Technical Support Organization, 2008.
Знайти повний текст джерелаBhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Indianapolis, IN: Cisco Press, 2008.
Знайти повний текст джерелаBhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Indianapolis, IN: Cisco Press, 2008.
Знайти повний текст джерелаMason, Andrew G. Cisco secure Internet security solutions. Indianapolis, Ind: Cisco Press, 2001.
Знайти повний текст джерелаЧастини книг з теми "Security solutions"
Versluis, Gerald, and Steven Thewissen. "Network and Security." In Xamarin.Forms Solutions, 153–89. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-4134-9_4.
Повний текст джерелаSchreck, Jörg. "Solutions for Security." In Security and Privacy in User Modeling, 95–156. Dordrecht: Springer Netherlands, 2003. http://dx.doi.org/10.1007/978-94-017-0377-2_8.
Повний текст джерелаLi, Bin, and David Zhang. "Signature Security System for E-Commerce." In Biometric Solutions, 187–216. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_8.
Повний текст джерелаMorton, Adam. "Managing Security and Access Control." In Mastering Snowflake Solutions, 67–98. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8029-4_4.
Повний текст джерелаMcDonald, Connor, Chaim Katz, Christopher Beck, Joel R. Kallman, and David C. Knox. "Security Packages." In Mastering Oracle PL/SQL: Practical Solutions, 415–62. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0702-3_8.
Повний текст джерелаLing, Lee Luan, and Miguel Gustavo Lizárraga. "Biometrics on the Internet: Security Applications and Services." In Biometric Solutions, 131–67. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_6.
Повний текст джерелаYou, Jane, and David Zhang. "Web Guard: A Biometrics Identification System for Network Security." In Biometric Solutions, 217–41. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-1053-6_9.
Повний текст джерелаAshley, Paul, and Mark Vandenwauver. "Comparison of the Security Solutions." In Practical Intranet Security, 207–14. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5609-1_10.
Повний текст джерелаDe Capitani di Vimercati, Sabrina, and Pierangela Samarati. "Data Privacy – Problems and Solutions." In Information Systems Security, 180–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77086-2_14.
Повний текст джерелаBarde, Snehlata. "Blockchain-Based Cyber Security." In Transforming Cybersecurity Solutions using Blockchain, 55–69. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6858-3_4.
Повний текст джерелаТези доповідей конференцій з теми "Security solutions"
Jasser, Stefanie, and Matthias Riebisch. "Reusing security solutions." In ECSAW '16: European Conference on Software Architecture Workshops. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2993412.3007556.
Повний текст джерелаFischer, D., B. Markscheffel, and T. Seyffarth. "Smartphone security: Overview of security software solutions." In 2013 IEEE Third International Conference on Information Science and Technology (ICIST). IEEE, 2013. http://dx.doi.org/10.1109/icist.2013.6747557.
Повний текст джерелаFischer, D., B. Markscheffel, and T. Seyffarth. "Smartphone security: Overview of security software solutions." In 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2013. http://dx.doi.org/10.1109/icitst.2013.6750208.
Повний текст джерелаHabbak, Hany, Khaled Metwally, and Ahmed Maher Mattar. "Securing Big Data: A Survey on Security Solutions." In 2022 13th International Conference on Electrical Engineering (ICEENG). IEEE, 2022. http://dx.doi.org/10.1109/iceeng49683.2022.9781955.
Повний текст джерелаAdibi, S. "Comparative mobile platforms security solutions." In 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 2014. http://dx.doi.org/10.1109/ccece.2014.6900963.
Повний текст джерелаMondol, Joel-Ahmed M. "Cloud security solutions using FPGA." In 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PacRim). IEEE, 2011. http://dx.doi.org/10.1109/pacrim.2011.6032987.
Повний текст джерелаSuomalainen, Jani, and Pasi Hyttinen. "Security Solutions for Smart Spaces." In 2011 IEEE/IPSJ 11th International Symposium on Applications and the Internet (SAINT). IEEE, 2011. http://dx.doi.org/10.1109/saint.2011.57.
Повний текст джерелаSeto, Myron W. L. "Security solutions: strategy and architecture." In Electronic Imaging 2002, edited by Rudolf L. van Renesse. SPIE, 2002. http://dx.doi.org/10.1117/12.462723.
Повний текст джерелаVenkatesh, P., and M. S. Tasmiya Taranum. "Network Security: Threats and Solutions." In Third International Conference on Current Trends in Engineering Science and Technology ICCTEST-2017. Grenze Scientific Society, 2017. http://dx.doi.org/10.21647/icctest/2017/49039.
Повний текст джерелаSteiner, Wilfried. "Candidate security solutions for TTEthernet." In 2013 IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC). IEEE, 2013. http://dx.doi.org/10.1109/dasc.2013.6712579.
Повний текст джерелаЗвіти організацій з теми "Security solutions"
Mbemba, Augustin. Central Africa: Salient Security Issues and Uncertain Political Solutions. Fort Belvoir, VA: Defense Technical Information Center, April 2010. http://dx.doi.org/10.21236/ada522104.
Повний текст джерелаHowell, Gema. Security Analysis of IoT Management Solutions for First Responders. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.tn.2223.
Повний текст джерелаPudelek, Jessie, and Kevin Hill. End-User Security: A Cornerstone of Defense-in-Depth Cybersecurity Solutions. Office of Scientific and Technical Information (OSTI), May 2019. http://dx.doi.org/10.2172/1524811.
Повний текст джерелаSchulzrinne, H., E. Marocco, and E. Ivov. Security Issues and Solutions in Peer-to-Peer Systems for Realtime Communications. RFC Editor, February 2010. http://dx.doi.org/10.17487/rfc5765.
Повний текст джерелаGopalan, Sundararajan Srinivasa, Rajesh Bhatia, Sonalini Khetrapal, and Sungsup Ra. Addressing Nutrition Security in Urban India through Multisectoral Action. Asian Development Bank, February 2022. http://dx.doi.org/10.22617/wps220057-2.
Повний текст джерелаMeijer, Karen, and Katongo Seyuba. The Role of Development Actors in Responding to Environment and Security Links. Stockholm International Peace Research Institute, December 2022. http://dx.doi.org/10.55163/kniz5636.
Повний текст джерелаGiordano, Meredith, Charlotte de Fraiture, Elizabeth Weight, and Julie van der Bliek. Water for wealth and food security: supporting farmer-driven investments in agricultural water management. Synthesis report of the AgWater Solutions Project. International Water Management Institute (IWMI)., 2012. http://dx.doi.org/10.5337/2012.207.
Повний текст джерелаOzano, Kim, Andrew Roby, and Jacob Tompkins. Learning Journey on Water Security: UK Water Offer. Institute of Development Studies (IDS), January 2022. http://dx.doi.org/10.19088/k4d.2022.026.
Повний текст джерелаArtis, Roslyn, Connie Ledoux Book, Jennifer Clinton, John S. Lucas, James P. Pellow, and Dawn Michele Whitehead. Advancing Global Stability and U.S. National Security through Peaceful Exchange. The International Coalition (coordinated by The Forum on Education Abroad), March 2021. http://dx.doi.org/10.36366/ic.agsausnstpe.03312021.
Повний текст джерелаBlack, Richard, Joshua Busby, Geoffrey D. Dabelko, Cedric de Coning, Hafsa Maalim, Claire McAllister, Melvis Ndiloseh, et al. Environment of Peace: Security in a New Era of Risk. Stockholm International Peace Research Institute, May 2022. http://dx.doi.org/10.55163/lcls7037.
Повний текст джерела