Zobrazeno 1 - 10
of 46
pro vyhledávání: '"Jyh-haw Yeh"'
Publikováno v:
Journal of Systemics, Cybernetics and Informatics, Vol 1, Iss 4, Pp 53-59 (2003)
Web usage mining is used to discover interesting user navigation patterns and can be applied to many real-world problems, such as improving Web sites/pages, making additional topic or product recommendations, user/customer behavior studies, etc. This
Externí odkaz:
https://doaj.org/article/efa66f9795c54171952dc93980851a4f
Publikováno v:
The Journal of Supercomputing. 76:8529-8547
In the present era, secure data storage for any Internet of Things (IoT) platform is plagued by poor performance of secure read and write operations, which limits the use of data storage security on any IoT platform. Therefore, in this paper, a data
Publikováno v:
2021 IEEE 26th Pacific Rim International Symposium on Dependable Computing (PRDC).
Publikováno v:
IEEE ICCI*CC
Despite the effort of the authorities and researchers, there has been no sign of decreasing in the number of fatal crashes annually. To analyze the deadly collisions, researchers have focused on finding which factors affect injury severity, and thus
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811533075
ICGEC
ICGEC
Dynamic searchable encryption is one branch of searchable encryption. Compared with the static searchable encryption, a dynamic searchable encryption scheme can support update (add or delete) of outsourced data. However, this kind of operation may ca
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::657a486670fed1cd001358f7a7a83767
https://doi.org/10.1007/978-981-15-3308-2_52
https://doi.org/10.1007/978-981-15-3308-2_52
Publikováno v:
International Journal of Information and Computer Security. 18:1
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 15:180-193
Authentication based on passwords is used largely in applications for computer security and privacy. However, human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as “the weakest link” in the authen
Publikováno v:
ISPA/BDCloud/SocialCom/SustainCom
Nowadays database outsourcing has become business owners' preferred option and they are benefiting from its flexibility, reliability, and low cost. However, because database service providers cannot always be fully trusted and data owners will no lon
Publikováno v:
2019 4th International Conference on Communication and Information Systems (ICCIS).
Autor:
Gaby G. Dagher, Srisarguru Sridhar (Mentor), Kathleen Dakota White, Ning Shen, Hung-Min Sun, Jyh-haw Yeh
Publikováno v:
PRDC
Over the years, email has evolved into one of the most widely used communication channels for both individuals and organizations. However, despite near ubiquitous use in much of the world, current information technology standards do not place emphasi