Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Hai-Duong Le"'
Publikováno v:
Journal of Information and Telecommunication, Vol 5, Iss 4, Pp 440-459 (2021)
The strong growth of communication and storage gives rise to the significantly increasing demand for collecting, storing, and sharing a large amount of data on networks. This is further enhanced by the data-driven market, where everyone wants to acce
Externí odkaz:
https://doaj.org/article/b115b62b0672456faa51a9df1ca512b5
Publikováno v:
Applied System Innovation, Vol 3, Iss 1, p 8 (2020)
In medical practice, the scanned image of the patient between the patient and the doctor is confidential. If info is stored on a single server and the server is successfully attacked, it is possible to expose confidential information. Password encryp
Externí odkaz:
https://doaj.org/article/2940940010794e19b3ef15e3d7ad9bff
Autor:
Hai-Duong Le, 黎海洋
103
Network security is an essential building block for all the distributed services functioning accordingly and reliably. Authenticated key agreement protocols provide confidentiality, integrity and authenticity to all the participants. This ty
Network security is an essential building block for all the distributed services functioning accordingly and reliably. Authenticated key agreement protocols provide confidentiality, integrity and authenticity to all the participants. This ty
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/98501821460556748130
Publikováno v:
Journal of Information and Telecommunication, Vol 5, Iss 4, Pp 440-459 (2021)
The strong growth of communication and storage gives rise to the significantly increasing demand for collecting, storing, and sharing a large amount of data on networks. This is further enhanced by the data-driven market, where everyone wants to acce
Autor:
Thanh-Tung Tran, Hai-Duong Le
Publikováno v:
Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications ISBN: 9789811680618
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::48fb5063fd48bdd6ffef82fb6e8efea4
https://doi.org/10.1007/978-981-16-8062-5_20
https://doi.org/10.1007/978-981-16-8062-5_20
Publikováno v:
Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications ISBN: 9789813343696
FDSE (CCIS Volume)
FDSE (CCIS Volume)
Among four ecommerce business models, the customer-to-customer (C2C) model allows customers to exchange goods or services, and get their money through fully or partly direct transactions. This model is usually dependent on mediate companies, e.g. eBa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ef11f291a5a6173001e79eb82481b104
https://doi.org/10.1007/978-981-33-4370-2_2
https://doi.org/10.1007/978-981-33-4370-2_2
Publikováno v:
Computational Collective Intelligence ISBN: 9783030630065
ICCCI
ICCCI
The strong growth of communication and storage gives rise to the significantly increasing demand for storing and sharing big data on networks. Research studies and industry applications can apply analytic techniques for exploiting data, or Internet u
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d432099316988ea488db6618325dd68a
https://doi.org/10.1007/978-3-030-63007-2_48
https://doi.org/10.1007/978-3-030-63007-2_48
Publikováno v:
Applied System Innovation, Vol 3, Iss 1, p 8 (2020)
Applied System Innovation
Volume 3
Issue 1
Applied System Innovation
Volume 3
Issue 1
In medical practice, the scanned image of the patient between the patient and the doctor is confidential. If info is stored on a single server and the server is successfully attacked, it is possible to expose confidential information. Password encryp
Publikováno v:
ACOMP
Auto-reconfiguration and response mechanisms in IP networks are challenges that lead to enforcing the required policies in such a dynamic environment. Software-Defined Network (SDN) provides an economic architecture solution for service providers by
Publikováno v:
Current Catalysis. 7:138-143