Showing 181 - 200 results of 5,943 for search '"Securities ', query time: 0.07s Refine Results
  1. 181
  2. 182
  3. 183

    Secure and Privacy Enhanced Gait Authentication on Smart Phone by Thang Hoang, Deokjai Choi

    Published 2014-01-01
    “…In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. …”
    Get full text
    Article
  4. 184
  5. 185

    An Efficient Data Analysis Framework for Online Security Processing by Jun Li, Yanzhao Liu

    Published 2021-01-01
    “…Industrial cloud security and internet of things security represent the most important research directions of cyberspace security. …”
    Get full text
    Article
  6. 186
  7. 187

    Challenges of Gender Policy Implementation in the Security and Defense Sector by O. M. Tsukan, M. Yu. Burdin

    Published 2020-09-01
    “…The authors of the article have studied the problems of ensuring the principles of gender equality in the free trade sector of the security and defense sector. Aspects of gender equality have a special role in ensuring the educational process, managing the free economic zone and overcoming stereotyping of society, especially in the security and defense sector. …”
    Get full text
    Article
  8. 188

    Information Security Risk Management Model for Big Data by Min Yang

    Published 2022-01-01
    “…The essence of information security management is risk management, which is closely related to each other. …”
    Get full text
    Article
  9. 189

    A Study on the Security Algorithm for Contexts in Smart Cities by Hoon Ko, Kitae Bae, Sang Heon Kim, Kyung Jin An

    Published 2014-06-01
    “…However, the provided services are to be secured and well protected. Each customised service usually keeps tailored security policy and algorithm. …”
    Get full text
    Article
  10. 190
  11. 191
  12. 192

    Securing Bird Feeders from Florida Black Bears by Ethan T. Noel, Elizabeth F. Pienaar

    Published 2017-05-01
    “…This 3-page fact sheet explains how to secure bird seed from bears so that they don’t become reliant on human food sources, a condition that puts them at greater risk of being killed from vehicle collisions, illegal shooting, or euthanasia. …”
    Get full text
    Article
  13. 193
  14. 194

    POVERTY AND NATIONAL SECURITY: AN OVERVIEW OF NIGERIA’S FOURTH REPUBLIC by ADAMU MOHAMMED

    Published 2024-07-01
    Subjects: “…National Security…”
    Get full text
    Article
  15. 195
  16. 196

    Secure P2P Data Storage and Maintenance by Nouha Oualha, Melek Önen, Yves Roudier

    Published 2010-01-01
    “…P2P data storage requires strong reliability and security assurances. Existing data storage solutions have been designed for centralized as well as distributed settings; yet they do not address the security and cooperation issues raised by self-organization. …”
    Get full text
    Article
  17. 197
  18. 198

    System of subjects ensuring national security and defence of Ukraine by O. V. Nesterenko

    Published 2020-06-01
    Subjects: “…system of subject for ensuring the national security and defense…”
    Get full text
    Article
  19. 199
  20. 200

    Efficient and Secure Traffic Scheduling Based on Private Sketch by Yang Chen, Huishu Wu, Xuhao Ren

    Published 2025-01-01
    “…In this paper, we propose ESTS, an efficient and secure traffic scheduling based on private sketch, capable of identifying tail contributors to adjust routing and prevent congestion. …”
    Get full text
    Article