Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

security integrity

 
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
In data communication network, one of the ideal network procedures is to transmit files securely from sender to a receiver… Expand
  • figure 1
  • figure 1
  • table I
  • figure 2
  • figure 3
Is this relevant?
2017
2017
Cloud computing is a sort of computing that is contingent on distribution computing resources preceding having innate servers or… Expand
Is this relevant?
2015
2015
The computer network technology is developing rapidly, and the development of internet technology is more quickly, people more… Expand
Is this relevant?
2014
2014
  • Zhiyong Lu, Y. Zhou
  • Fourth International Conference on Communication…
  • 2014
  • Corpus ID: 7597442
After analyzing and quantifying the network information security elements: confidentiality, integrity and availability, this… Expand
  • figure 1
  • table I
  • table II
  • table III
Is this relevant?
2014
2014
  • Oyeleye Christopher, Y. DaramolaComfort, Akinpelu James
  • 2014
  • Corpus ID: 212561200
Researches in the development of efficient security models, policies and standards for the Android platform has increased… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 2
Is this relevant?
2014
2014
In Mobile Adhoc Networks (MANET), Network nodes move randomly so the topology changes unpredictably and faster. Due to the… Expand
  • figure 1
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
2013
2013
We introduce a mechanism for the verification of real-time integrity policies about the operation of a distributedsystem. Our… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2012
2012
This paper investigates the Android permission system and its adequacy in alerting end-users of potential information privacy… Expand
  • table 1
  • table 2
  • figure 1
  • table 3
Is this relevant?
2008
2008
New tactical communications systems are often required to be able to support independent operations on several channels… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2007
2007
The security of disaster management systems is a serious concern because of the sensitive and complex nature of this domain. It… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?