Showing 181 - 200 results of 9,720 for search '"Securities ', query time: 0.05s Refine Results
  1. 181
  2. 182
  3. 183

    Making Simple Repairs: Home Security by Mary N. Harrison

    Published 2019-05-01
    “… Keep your home safe and secure. When away from home, at night, or while sleeping lock your doors and windows. …”
    Get full text
    Article
  4. 184
  5. 185

    The Distribution of the Tax and Social Security Burden by Niklas Isaak, Philipp Jäger, Robin Jessen

    Published 2021-04-01
    “…Abstract Using a cross-sectional analysis, this article investigates the burden of taxation and social security contributions across German households. The burden is determined with respect to household income as well as consumption level. …”
    Get full text
    Article
  6. 186

    Secure obfuscation for encrypted threshold signatures by Yahong LI, Caifen WANG, Yulei ZHANG, Xiaodong YANG, Haiyan HUANG

    Published 2020-06-01
    “…Aiming at the key leakage security problem of the threshold signature,an encrypted threshold signature functionality was firstly proposed and securely obfuscated.The output of obfuscated circuit could be implemented by any third party without revealing the private key of threshold signature.Secondly,the security models of encrypted threshold signature functionality and the obfuscator were defined,such as the existential unforgeablity and the average case virtual black box property,and its correctness and security were proved.The analyses of theory and simulation experiment show that the obfuscation for encrypted threshold signature has feasibility.…”
    Get full text
    Article
  7. 187
  8. 188
  9. 189
  10. 190
  11. 191
  12. 192
  13. 193
  14. 194

    FEATURES OF THE CONCEPT AND CONTENT OF PUBLIC SECURITY by Liliia Muntian

    Published 2024-12-01
    Subjects: “…security; national security; public security; public order; public order; law and order; civil security…”
    Get full text
    Article
  15. 195

    Review of domestic and international financial security by Lian-peng LI, Hong LUO

    Published 2017-02-01
    Subjects: “…financial information security…”
    Get full text
    Article
  16. 196

    Political discourse, military and securitization of health nexus: contemporary security challenges and the military role in public health security by Vanja Rokvić, Vladimir Ajzenhamer

    Published 2020-02-01
    “…The purpose of this paper is to provide answers to the questions why health is viewed through the lens of national and international security, and what might be the potential role of the armed forces in strategic response to health security challenges. …”
    Get full text
    Article
  17. 197
  18. 198

    Provably secure and efficient proxy signature scheme by Jie ZENG, Wei NIE

    Published 2014-08-01
    “…The random oracles are combined in the scheme and a smaller vector norm blind message is used to control the dimension of proxy signature secret key. The security of proposed scheme is based on the hardness of shortest vector problem and small integer solution problem, and the scheme satisfies the security require-ments of a proxy signature scheme. …”
    Get full text
    Article
  19. 199
  20. 200

    Differential security evaluation of Piccolo-like structure by Nianping WANG, Qing YIN

    Published 2022-02-01
    “…In order to diversify the design of block cipher, Piccolo-like structure was proposed with principles of design.Security evaluation for Piccolo-like structure against differential cryptanalysis was deeply studied.By studying the input-output propagation characteristics of differential characteristics, the lower bound on the number of active round functions for arbitrary round Piccolo-like structure was given.The results show that, under the condition that the round functions are all bijective, there are at least l active round functions for l-round Piccolo-like structure if l≥6, and there are at least l-1 active round functions for l-round Piccolo-like structure if l is 1,2,3,4,5.…”
    Get full text
    Article