Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
J Hu, HH Chen, TW Hou - Computer Standards & Interfaces, 2010 - Elsevier
The Health Insurance Portability and Accountability Act (HIPAA) has set privacy and security
regulations for the US healthcare industry. HIPAA has also established principles for security …
regulations for the US healthcare industry. HIPAA has also established principles for security …
Review of some recent european cybersecurity research and innovation projects
M Çağlayan - Infocommunications Journal, 2022 - avesis.yasar.edu.tr
This paper reviews research from several EU Projects that have addressed cybersecurity
using techniques based on Machine Learning, including the security of Mobile Networks …
using techniques based on Machine Learning, including the security of Mobile Networks …
Trustworthiness and quality of context information
Context-aware service platforms use context information to customize their services to the
current users' situation. Due to technical limitations in sensors and context reasoning …
current users' situation. Due to technical limitations in sensors and context reasoning …
[HTML][HTML] A Certificate Authority (CA)-based cryptographic solution for HIPAA privacy/security regulations
Abstract The Health Insurance Portability and Accountability Act (HIPAA) passed by the US
Congress establishes a number of privacy/security regulations for e-healthcare systems …
Congress establishes a number of privacy/security regulations for e-healthcare systems …
The Notary Based PKI: A Lightweight PKI for Long-Term Signatures on Documents
We propose a new Public Key Infrastructure model for long-term signatures. It is based on X.
509 and the real world of handwritten signatures. In the model, notaries certify that a signer's …
509 and the real world of handwritten signatures. In the model, notaries certify that a signer's …
Cognitive packet networks for the secure internet of things
The concept of Security Aware Routing is not widely adopted in current networks. However,
the new IoT-centric core networks give possibilities to re-open that field of research. We …
the new IoT-centric core networks give possibilities to re-open that field of research. We …
Personal PKI for the Smart Device Era
As people use an increasing number of smart devices for their everyday computing, it is
surprising that these powerful, internet-enabled devices are rarely connected together to …
surprising that these powerful, internet-enabled devices are rarely connected together to …
European cybersecurity research and the seriot project
This paper briefly reviews some recent research in Cybersecurity in Europe funded by the
European Commission in areas such as mobile telephony, networked health systems, the …
European Commission in areas such as mobile telephony, networked health systems, the …
Optimized certificates–A new proposal for efficient electronic document signature validation
Optimized certification is a new method for efficient certificate path verification and digital
signing. The basic idea is to issue special certificates (called optimized certificates) for an …
signing. The basic idea is to issue special certificates (called optimized certificates) for an …
Improvements in computational aspects of interval Kalman filtering enhanced by constraint propagation
J **ong, C Jauberthie… - 2013 IEEE 11th …, 2013 - ieeexplore.ieee.org
This paper deals with computational aspects of interval kalman filtering of discrete time
linear models with bounded uncertainties on parameters and gaussian measurement noise …
linear models with bounded uncertainties on parameters and gaussian measurement noise …