[CITATION][C] SE6 Secure Digital Systems

DM Harris, N Rohrer - … Solid-State Circuits Conference. Digest of …, 2007 - ieeexplore.ieee.org
Digital security has become an essential feature in many modern systems. In 2005 and
2006, nearly one third of the residents of the United States have been informed that their …

Adoption of blockchain technology through digital twins in the construction industry 4.0: A PESTELS approach

B Teisserenc, S Sepasgozar - Buildings, 2021 - mdpi.com
secured by firewalls. Whereas BCT can guarantee security with trusted open networks that
are secured … This cyber security paradigm shift offered by BCT has considerable potential to …

[DOC][DOC] Information Systems Security: Distributed Modules or Centralized Course?

CM Eastman, C Farkas - se.asee.org
security-related modules: Digital Systems Verification and Test and Fault Tolerance. The
security… of a semester course of security-related topics (NC3, SP5, SP7, SE6, and portions of IM1…

Implementation of DES using pipelining concept with skew core key scheduling in secure transmission of images

K Praveen, P Poornachandran, ASR Ajai - Proceedings of the second …, 2012 - dl.acm.org
digital communication systems require reliable security in processing and transmission of
digital … development of internet in the digital world demands more concern in to the security of …

Information security policy non-compliance: Can capitulation theory explain user behaviors?

A McLeod, D Dolezel - Computers & Security, 2022 - Elsevier
security measures and fail to follow security related directives, data breaches are more likely
to occur. We hypothesize that users are giving up on security … information systems security

The use of a technology acceptance model (TAM) to predict patients' usage of a personal health record system: the role of security, privacy, and usability

A Alsyouf, A Lutfi, N Alsubahi, FN Alhazmi… - International journal of …, 2023 - mdpi.com
system (Shifaa platform) shows great concern for the security of any transactions. SE3 I think
PHR system (… SE6 I think PHR system (Shifaa platform) has sufficient technical capacity to …

Efficient resource management of micro-services in vanets

MB Taha, S Alrabaee, KKR Choo - … Transportation Systems, 2023 - ieeexplore.ieee.org
… Finally, in se6, we find that Kubernetes approach may yield … In se5 and se6, the proposed
approach shows less network … We observe that in se6 when all vehicles have full available …

[PDF][PDF] Implementation of XOR Based Pad Generation Mutual Authentication Protocol for RF Link

K Ramya, G Priyadarshini - academia.edu
… The Xilinx 13.x software is used for synthesize and modelsim SE6.0 is used for simulating
the result. The pad generation algorithm has been implemented in FPGA Spartan 3 PQ208-4 …

[PDF][PDF] Identification of Dimensions and Components for Implementing E-Learning with an Omnichannel Approach in Upper Secondary Schools

RH Limodehi, M Abdollahi, S Habibi - Sciences, 2024 - iase-ijeas.com
Purpose: The objective of this study is to identify the critical dimensions and components
necessary for implementing e-learning with an omnichannel approach in upper secondary …

Understanding security behaviors in personal computer usage: A threat avoidance perspective

H Liang, YL Xue - … of the association for information systems, 2010 - aisel.aisnet.org
… These employees, like home computer users, are highly likely to engage in unsafe computer
behaviors and become weak links in the organizational security system. Security education, …