A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit <a rel="external noopener" href="http://eprint.iacr.org/2015/226.pdf">the original URL</a>. The file type is <code>application/pdf</code>.
Filters
Secure Physical Computation Using Disposable Circuits
[chapter]
<span title="">2015</span>
<i title="Springer Berlin Heidelberg">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a>
</i>
This paper takes an orthogonal approach using disposable circuits (DC)-cheap hardware tokens that can be completely destroyed after a computation-an extension of the familiar tamper-proof token model. ...
In a secure physical computation, a set of parties each have physical inputs and jointly compute a function of their inputs in a way that reveals no information to any party except for the output of the ...
Fig. 3 . 3 Ideal world physical 2PC
Fig. 4 . 4 SPV from secure 2PC.
Fig. 5 . 5 Schematic of the physical setup for secure physical 2PC using disposable circuits (Protocol 2). ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46494-6_9">doi:10.1007/978-3-662-46494-6_9</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4xbamc5jujdhfa5r2liv7qc6ia">fatcat:4xbamc5jujdhfa5r2liv7qc6ia</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160803235401/http://eprint.iacr.org/2015/226.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/a8/71/a871e621fb33a7b79e790b0f534041994a46374f.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46494-6_9">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
springer.com
</button>
</a>
Cryptography with Disposable Backdoors
<span title="2019-08-20">2019</span>
<i title="MDPI AG">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ld7penalpndgxesxlh3sf425ee" style="color: black;">Cryptography</a>
</i>
We further describe how to use our ideas to derive a version of CCA-secure public key encryption, which is accompanied with a disposable (i.e., single-use, as in the above scenario) backdoor. ...
computation and classical stateless hardware tokens. ...
Physical computation. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/cryptography3030022">doi:10.3390/cryptography3030022</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/witjh4fx75d7vnnpxwozbqilky">fatcat:witjh4fx75d7vnnpxwozbqilky</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200211211518/https://res.mdpi.com/d_attachment/cryptography/cryptography-03-00022/article_deploy/cryptography-03-00022.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/38/2e/382e26a733964d472f77c48a4b6ad3abb342ea88.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/cryptography3030022">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="unlock alternate icon" style="background-color: #fb971f;"></i>
mdpi.com
</button>
</a>
Proposed Solution of e-Waste Management
<span title="">2013</span>
<i title="EJournal Publishing">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hvh5w7m2xzcrhkbhz4hppekzju" style="color: black;">International Journal of Future Computer and Communication</a>
</i>
This definition includes used electronics which are destined for reuse, resale, salvage, recycling, or disposal. ...
Electronic waste may be defined as discarded computers, office electronic equipment, entertainment device electronics, mobile phones, television sets and refrigerators. ...
equipments and
circuit boards. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7763/ijfcc.2013.v2.212">doi:10.7763/ijfcc.2013.v2.212</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/n6g53u3qhfbrpbtlfxomikyyba">fatcat:n6g53u3qhfbrpbtlfxomikyyba</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20161123050847/http://www.ijfcc.org:80/papers/212-S060.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/94/27/942701db5b198350e514cc8b7a752107a8d99aa9.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7763/ijfcc.2013.v2.212">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
Publisher / doi.org
</button>
</a>
Technology confronts SARS
<span title="">2003</span>
<i title="Elsevier BV">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kowyypahlzcqxlzyk7nwiadqie" style="color: black;">Lancet. Infectious Diseases (Print)</a>
</i>
Infrared sensor to detect SARS The Shanghai Institute of Technology and Physics recently invented an infrared sensor that can determine a person's body temperature without physical contact. ...
software similar to computer
security programs that track computer
viruses across networks,
reports Straits Times. ...
One product, a sachet, could be used to discourage spitting in the streets; people spit instead into the sachet, which disinfects the phlegm and can be disposed of later. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/s1473-3099(03)00677-7">doi:10.1016/s1473-3099(03)00677-7</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/eat7j7kdbbhtzpsdvdcv7ahjge">fatcat:eat7j7kdbbhtzpsdvdcv7ahjge</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200329043830/https://pdf.sciencedirectassets.com/272254/1-s2.0-S1473309900X00242/1-s2.0-S1473309903006777/main.pdf?X-Amz-Security-Token=IQoJb3JpZ2luX2VjENT%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCXVzLWVhc3QtMSJHMEUCIHKuttuGrN%2B9OZI8mj9qOcPjrikUcG0g5XQR478D%2FudTAiEA9MYdBbySpKNWeI3qbmb9yWANXjgFsqUZ9lEIn7ly2uAqvQMIzf%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FARACGgwwNTkwMDM1NDY4NjUiDHsN9jzqLuRQfGlrKCqRA1sVLhOa2xS6ojQ2%2FfpbG5ki0IWVnpbZvvKtL%2FM13G%2FTC0hIActKwHtfNpSwPqRXI0zhohtxPSqfrJzwVzsdm2IWHRUT3qXXvTTDpWcqZdi0xjxBhA%2F9b%2Bwd1QGtlzpiUcBkizDnt%2Fc6ufANvufJAENzN8Uk%2BHzqwQ1FnCci5DRS7gbrk3xF5smLAd8XzCcRCCdZYgIUNrZAtgbVxLVjQ4jFRgK%2Bp1bkFCaqIaXL1rOdPhm8QdizICRhRMaeUWAkHnmKFldOv6HqQFYHD9oaH2M4emMw84lt7dBieyEBVGL0ekDd9Va5OTJCcwhLBbym2nciO9BttKkxvz6WjOfmjmHXREBGGxDZ2021QKEty2o1AkKyC1bCvkrakv5lRfAevB%2F1GDxAHAxVPOv8X%2Feb0T%2FRDlZ6rC2cfanz9Dqw5l4KaRipFYLLRY0ylRG7sMcAd3e%2FPelwCqAGwUYA4%2B%2FL3BZoNYAHlfcaPtivAthyqa0A3PrWAPpMDT%2F3%2FgkSdt2mJh%2Bv2xuZw9OlwBIiaiktWhS2MLqvgPQFOusB89LzqV38SXjXKciwOZeBbGyW0SZGgSo27kJnxN9%2FGrIkLqR8QwnQ0fHmUFnlH786IaqBGa5vqboF2hk5%2BJhJcnR4CcyHND1BHcwJ3zlQaSa7HzAcT%2BA42cmrKjQN9RgMvzferY71US7kdewhi9CWvgtZ04wUz3sMlKwI7hY7nES3Ah%2Bp3dGFOxuAyX9VunJcba6OcMaEkalQmUXMJn83BjK%2B2ZirtdXgkrMSqegL%2F8OpMt9lH5aS19fy2y9ulD9fTtdl51fooXXtoeJPDahDrGDRbrFlazZZiTqssFQOe4AAuzcHbEQzBVc%2FUQ%3D%3D&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200329T043826Z&X-Amz-SignedHeaders=host&X-Amz-Expires=300&X-Amz-Credential=ASIAQ3PHCVTYZIYW6U7L%2F20200329%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=7317db5b443aa34d279e1a4653f03ed9257ab0c81870115e65ccfe2019490f2a&hash=a7226423cd8a777f8a877ab573b909486348c36a52eca3ceedc64290e05f33d5&host=68042c943591013ac2b2430a89b270f6af2c76d8dfd086a07176afe7c76c2c61&pii=S1473309903006777&tid=spdf-654ded95-b85b-47a4-afba-961e5f3c1031&sid=bd25f0643eb2714f319ab354d66ba3992a3dgxrqa&type=client" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/d6/7f/d67fe1ea4da65f8e0cd49d7637d180254d83d18c.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/s1473-3099(03)00677-7">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
elsevier.com
</button>
</a>
Cryptography Goes to the Cloud
[chapter]
<span title="">2011</span>
<i title="Springer Berlin Heidelberg">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jyopc6cf5ze5vipjlm4aztcffi" style="color: black;">Communications in Computer and Information Science</a>
</i>
encryption and secure outsourced computation will become popular in the near future, opening the doors of the Cloud to customers with higher security requirements. ...
In this paper we identify some areas where cryptography can help a rapid adoption of cloud computing. ...
That means that the garbled circuits can be used only once and their size is proportional to the size of the function to be computed. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-22365-5_23">doi:10.1007/978-3-642-22365-5_23</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hiv6tmgbczf5jkwjqnr5augku4">fatcat:hiv6tmgbczf5jkwjqnr5augku4</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809082414/https://www.nics.uma.es/sites/default/files/papers/agudo2011cryptography.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/6a/83/6a834271f7207ee7a81799dc1e9d7c3e3de05266.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-22365-5_23">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
springer.com
</button>
</a>
SafePay: Protecting against credit card forgery with existing magnetic card readers
<span title="">2015</span>
<i title="IEEE">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/m37r6seibve4bbsmm5f464tigm" style="color: black;">2015 IEEE Conference on Communications and Network Security (CNS)</a>
</i>
drives a magnetic card chip to simulate the behavior of a physical magnetic card. ...
To tackle the problem, researchers have proposed several new techniques such as integrated circuit card (IC card) and mobile wallet applications [1]; however, none of them can support existing magnetic ...
Broadly speaking, our SafePay is related to Cyber-Physical System (CPS), a system consisting of computational elements controlling physical entities. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/cns.2015.7346825">doi:10.1109/cns.2015.7346825</a>
<a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/cns/CaoPC15.html">dblp:conf/cns/CaoPC15</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rzx2c5ms5ffmtgtepz6quq3aje">fatcat:rzx2c5ms5ffmtgtepz6quq3aje</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809120608/http://yinzhicao.org/CreditCard/SafePay.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/99/f7/99f7322c214e10853ed2ee3b952fdac8452728b0.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/cns.2015.7346825">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
ieee.com
</button>
</a>
The Research of Autonomous In-orbit Health Management System for China's Manned Spacecrafts
<span title="">2019</span>
<i title="EDP Sciences">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4vlgvitw6fcmbay5hkyo2s2ime" style="color: black;">MATEC Web of Conferences</a>
</i>
By using various intelligent inference algorithms (such as physical model, neural network, data integration, fuzzy logic, expert system, etc. ...
Considering the computer capability and design complexity, normally the system mainly includes the platform security related status that requires high realtime performance into the scope of autonomous ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1051/matecconf/201925701006">doi:10.1051/matecconf/201925701006</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xevrs6dfwzhu3khzexqtakzesi">fatcat:xevrs6dfwzhu3khzexqtakzesi</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190427023652/https://www.matec-conferences.org/articles/matecconf/pdf/2019/06/matecconf_pmae2018_01006.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/77/49/7749043466d2e5e36e99e06d8ac5be1f6de90b56.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1051/matecconf/201925701006">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="unlock alternate icon" style="background-color: #fb971f;"></i>
Publisher / doi.org
</button>
</a>
Hardware and Security
[chapter]
<span title="">2012</span>
<i title="Elsevier">
Handbook on Securing Cyber-Physical Critical Infrastructure
</i>
Even after hardware outlives its usefulness, we must dispose of it properly or risk attacks such as theft of the data or software still resident in the hardware. ...
Memory Protection Security policies define how users of a computing system are allowed to use, modify, or share its resources. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/b978-0-12-415815-3.00012-1">doi:10.1016/b978-0-12-415815-3.00012-1</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/usk6j5webjdytjmtjublkukjve">fatcat:usk6j5webjdytjmtjublkukjve</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20140309003731/http://www.seas.gwu.edu:80/~simha/research/HWSecBookChapter12.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/af/bc/afbc0b8ef4ec57294a9cdcf43a17c4fbc5b206e5.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/b978-0-12-415815-3.00012-1">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
elsevier.com
</button>
</a>
Design of IoT based Smart Home System
<span title="2021-12-13">2021</span>
<i title="ADD Technologies">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ajkap75r2zh2zmbzmciolww4ru" style="color: black;">Journal of University of Shanghai for Science and Technology</a>
</i>
The Internet of Things (IoT) is used to describe a network of physical objects which are connected to each other with the help of embedded sensors, transceivers and software code to communicate and share ...
IoT devices are not only used in Homes but also in Industries where they can play a pivotal role in bringing down operating costs and helping companies make better business decisions to align their companies ...
Thus, the speed of various devices using the WiFi internet connection increases as the computer approaches the main source, while the speed decreases as the computer moves away from the source. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.51201/jusst/21/121013">doi:10.51201/jusst/21/121013</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/352nar3synb3lcdk7v26akn7w4">fatcat:352nar3synb3lcdk7v26akn7w4</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220226072434/https://jusst.org/wp-content/uploads/2021/12/Design-of-IoT-based-Smart-Home-System.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/b5/8d/b58d4a5036119cb60f47f4f1f4ddf814e6e765bb.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.51201/jusst/21/121013">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
Publisher / doi.org
</button>
</a>
Quantum Fog Cloud Model In Internet Of Things With Analysis Of Green Computing
<span title="2017-01-31">2017</span>
<i title="Zenodo">
Zenodo
</i>
So, our proposed Model the Fog-Things Model will help us to determine the security issues and indeed secure the entire IoT network. ...
The technology of Quantum Green Computing has been discussed in this paper. It also discusses the need of the many implementation techniques and approaches in relation with Fog-Cloud Computing. ...
This requires a combination of physical security and cybersecurity. Handle an unprecedented volume, variety, and velocity of data. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.264026">doi:10.5281/zenodo.264026</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ylwzy72xb5dx5aqzo5cpla4cam">fatcat:ylwzy72xb5dx5aqzo5cpla4cam</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201222193639/https://zenodo.org/record/264026/files/20_IJRG17_A01_19.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/cb/31/cb31480c5366a6d48b41185c3c42fcbfa32e7ee3.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.264026">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="unlock alternate icon" style="background-color: #fb971f;"></i>
zenodo.org
</button>
</a>
SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud
[article]
<span title="2020-10-05">2020</span>
<i >
arXiv
</i>
<span class="release-stage" >pre-print</span>
In this paper, we survey industrial and academic deployment models of multi-tenant FPGAs in the cloud computing settings, and highlight their different adversary models and security guarantees, while shedding ...
clients sharing physical resources with victim users. ...
Several of these security threats, aside from ones that arise specifically from FPGA use, have their analogues in traditional cloud-based VM computing. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2009.13914v2">arXiv:2009.13914v2</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mbdpjfuoljderjhopoppxkxkoe">fatcat:mbdpjfuoljderjhopoppxkxkoe</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201023103957/https://arxiv.org/pdf/2009.13914v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/96/81/9681c956b0ab2679f30cb700439251f103645aca.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2009.13914v2" title="arxiv.org access">
<button class="ui compact blue labeled icon button serp-button">
<i class="file alternate outline icon"></i>
arxiv.org
</button>
</a>
QUANTUM FOG CLOUD MODEL IN INTERNET OF THINGS WITH ANALYSIS OF GREEN COMPUTING
<span title="2017-01-31">2017</span>
<i title="Granthaalayah Publications and Printers">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/qx6hbcdtdvhuhhez3nqqmbosza" style="color: black;">International journal of research - granthaalayah</a>
</i>
So, our proposed Model the Fog-Things Model will help us to determine the security issues and indeed secure the entire IoT network. ...
The technology of Quantum Green Computing has been discussed in this paper. It also discusses the need of the many implementation techniques and approaches in relation with Fog-Cloud Computing. ...
This requires a combination of physical security and cybersecurity. Handle an unprecedented volume, variety, and velocity of data. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.29121/granthaalayah.v5.i1.2017.1886">doi:10.29121/granthaalayah.v5.i1.2017.1886</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ecnahjlxuzgkzn2cdd72oya3yi">fatcat:ecnahjlxuzgkzn2cdd72oya3yi</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201024153147/https://www.granthaalayahpublication.org/journals/index.php/granthaalayah/article/download/IJRG17_A01_19/1766" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/62/6d/626de31f1c206120c9cf827afd6db9db1f05964c.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.29121/granthaalayah.v5.i1.2017.1886">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="unlock alternate icon" style="background-color: #fb971f;"></i>
Publisher / doi.org
</button>
</a>
Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]
<span title="">2016</span>
<i title="Institute of Electrical and Electronics Engineers (IEEE)">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dsrvu6bllzai7oj3hktnc5yf4q" style="color: black;">Computer</a>
</i>
His research interests include security issues in cyber-physical systems, mobile/ad hoc/sensor/cellular networks, social networks, storage systems, and anonymous communication systems. ...
Commonly accepted procedures used to optimize a design for area, power, timing, and other parameters can also con ict with security principles. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mc.2016.260">doi:10.1109/mc.2016.260</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xh5zdbab7zfqloewzdydb2jgju">fatcat:xh5zdbab7zfqloewzdydb2jgju</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190228041039/http://pdfs.semanticscholar.org/9c06/4b7bf1a718066cf359dabf7c5c2739d0cc3d.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/9c/06/9c064b7bf1a718066cf359dabf7c5c2739d0cc3d.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mc.2016.260">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
ieee.com
</button>
</a>
Page 10 of Journal of Systems Management Vol. 23, Issue 10
[page]
<span title="">1972</span>
<i title="John Carroll University, School of Business">
<a target="_blank" rel="noopener" href="https://archive.org/details/pub_journal-of-systems-management" style="color: black;">Journal of Systems Management </a>
</i>
Both users and computer center personnel may be negligent. Sensitive punched cards and printouts not properly disposed of constitute a security breach. ...
Computer operators, system programmers, and maintenance personnel have special privileges. Mis- use of these special privileges or errors by computer center personnel poses a special threat. ...
<span class="external-identifiers">
</span>
<a target="_blank" rel="noopener" href="https://archive.org/details/sim_journal-of-systems-management_1972-10_23_10/page/10" title="read fulltext microfilm" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Archive [Microfilm]
<div class="menu fulltext-thumbnail">
<img src="https://archive.org/serve/sim_journal-of-systems-management_1972-10_23_10/__ia_thumb.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
Automation of Ash Handling System with Event Logger
English
<span title="2014-12-25">2014</span>
<i title="Seventh Sense Research Group Journals">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/iir5i5vb3jealaqt4oybz63t4y" style="color: black;">International Journal of Computer Trends and Technology</a>
</i>
English
Embedded I/O and expansion I/O are used.1769 IQ 32 module used as digital input channels.1769 IQ 32 module having 32 digital input. Another module is OW16, it is digital output module. ...
Main plant renovation is done in 2004 by using HF CONROL DCS but most of the subsystem was not renovated. ...
The bottom ash collected in the slurry tank is removed by using slurry disposal pump. There are three slurry disposal pumps. The slurry disposal area is about 100 hectors where ash is dumped. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14445/22312803/ijctt-v18p150">doi:10.14445/22312803/ijctt-v18p150</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/n22fuffkpvgwtkrd3lboqn6cje">fatcat:n22fuffkpvgwtkrd3lboqn6cje</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150323013826/http://www.ijcttjournal.org/Volume18/number-5/IJCTT-V18P150.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/12/ce/12ceb39ffc5d09888c9244100be732bc36da7917.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14445/22312803/ijctt-v18p150">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="unlock alternate icon" style="background-color: #fb971f;"></i>
Publisher / doi.org
</button>
</a>
« Previous
Showing results 1 — 15 out of 15,893 results