A methodical analysis of medical internet of things (MIoT) security and privacy in current and future trends

Y Perwej, N Akhtar, N Kulshrestha… - Journal of Emerging …, 2022 - hal.science
Healthcare system is rapidly transitioning from a traditional health-center and specialist-
focused model to a more scattered, patient-centric model. Medical Internet of Things (MIoT) …

E‐commerce impact: emerging technology–electronic auditing

JM Shaikh - Managerial Auditing Journal, 2005 - emerald.com
Purpose–We expect an explosive application of these technologies to take place when they
become mature and may further assist auditors in improving the quality of their work. How to …

[图书][B] Secure coding: principles and practices

M Graff, KR Van Wyk - 2003 - books.google.com
Practically every day, we read about a new type of attack on computer systems and
networks. Viruses, worms, denials of service, and password sniffers are attacking all types of …

Authenticity and integrity in the digital environment: an exploratory analysis of the central role of trust

C Lynch - Museums in a digital age, 2013 - api.taylorfrancis.com
We have detected little or no evidence of technophobia among visitors. Indeed the usage of
computers among visitors–at work, home or school–is very high at around 80-90 per cent …

Gridbank: A grid accounting services architecture (gasa) for distributed systems sharing and integration

A Barmouta, R Buyya - Proceedings International Parallel and …, 2003 - ieeexplore.ieee.org
Computational Grids are emerging as a new infrastructure for Internet-based parallel and
distributed computing. They enable the sharing, exchange, discovery, and aggregation of …

[图书][B] RC4 stream cipher and its variants

G Paul, S Maitra - 2011 - books.google.com
RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software
stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 …

[图书][B] Preserving digital information

HM Gladney - 2007 - Springer
Cultural history enthusiasts have asserted the urgent need to protect digital information from
imminent loss. Without action, much of what has been created in digital form is likely to …

[图书][B] Coordination of Internet agents: Models, technologies, and applications

A Omicini, F Zambonelli, M Klusch, R Tolksdorf - 2013 - books.google.com
As today's most complex computing environment, the Internet confronts IT researchers,
system designers, and application developers with completely new challenges and, as a …

[图书][B] Surviving security: how to integrate people, process, and technology

A Andress - 2003 - taylorfrancis.com
Previous information security references do not address the gulf between general security
awareness and the specific technical steps that need to be taken to protect information …

Method and apparatus for controlling unsolicited messaging in real time messaging networks

R Gilchrist, R Fogel, J Alsop - US Patent 7,613,923, 2009 - Google Patents
US7613923B2 - Method and apparatus for controlling unsolicited messaging in real time
messaging networks - Google Patents US7613923B2 - Method and apparatus for controlling …